

CryptoDefense employs the Windows CryptoAPI application. The main difference between the two ransomware pieces is that CryptoLocker generates the RSA encryption and decryption keys on the Command & Control server. However, that claim later turned out not to be true. It pretends to use the RSA-2048 encryption algorithm, claiming that once encrypted, the user’s files will no longer be accessible. Similar to CryptoLocker, CryptoDefense is distributed primarily via spam email campaigns. If so, it will automatically turn into a decryptor tool and grant instructions to the victim.
DECRYPT FILES FROM CRYPTO LOCKER SOFTWARE
Interestingly, there are rare occasions when cyber crooks turn out to be quite cooperative and lower the ransom amount (very rare).įurthermore, PClock is designed to delete Shadow Volume Copies by issuing the following command:Īfter the Shadow Volume Copies have been deleted, the malicious software will continuously check bitcoin software to see if a payment has been finalized. Paying the ransomware will not necessarily lead to the files’ safe restoration. PClock is also known to change the victim’s desktop to the ‘extortion’ message with instructions to pay the ransom and acquire a decryption key. WinCL.exe is where the primary file is located.Įven if the victim succeeds to terminate the WinCL.exe process, the encrypted files will unfortunately stay this way. Once the ransomware is installed, its files will be found in: xlsx PClock: Contamination Path and Malicious Process The types of files and their extensions encrypted by PClock are: Once the encryption process is completed and the files with particular extensions are affected, the victim will be presented with a ransom screen and a 72-hour countdown. Most likely, it is distributed via other malware pieces that infiltrate the system in a stealthy manner – Trojans and backdoors which can grant remote access any time they wish. Back in January, the Cryptolocker copycat ‘s distribution technique was not yet unveiled. Researchers named the ‘virus’ PClock because of a project name located inside the malware executable. Even though it is not CryptoLocker, it still encrypts the user’s data and asks for payment in BitCoin. The malicious threat masquerades itself as CryptoLocker. PClock was discovered several months ago but has been recently reactivated. It is indeed a CryptoLocker imitator and has frustrated too many users since the beginning of 2015. Just recently, the PClock has been awakened. Among all of the file-encrypting pieces, there are particularly two that seem to outshine them all – CryptoWall and CryptoLocker.ĬryptoLocker, however, has proven to be quite the shapeshifter, with all of its versions and copycats. To many people, especially security researchers, common tax payers/ victims and corporations, ransomware has turned into a nightmare. In the past couple of years, ransomware attacks have reached skyrocket levels. Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive. Possibly drive-by downloads, spam email attachments, unsafe browsing.ĭownload SpyHunter, to See If Your System Has Been Affected By PClock Ransomware A file-encrypting threat that demands payment in Bitcoins and locks the victims’ desktops.
