In old movies, ransom notes came in the form of pasted letters cut from newspapers. There’s a new kind of ransom that could pose a substantial risk to your business. Have you alerted your staff about how to protect one of your company’s most valuable assets?
The new threat is called Cryptolocker, a form of malware that locks you out of your own computer system unless you transfer money to shadowy shakedown artists who could be located down the street – or around the globe. Cryptolocker works by encrypting everything on your system’s hard drive or any shared folders: business records, client files, financial data, the works. Once the files are encrypted, victims get the ransom note, complete with an ominous countdown clock warning people when their files will be gone for good. The criminals demand money through Bitcoin or some other anonymous payment method and say they’ll turn over the encryption key if you cough up the cash. Some companies have paid, but there’s no guarantee the crooks will unlock your files.
How do they work their way into your company’s system? Scammers send email that looks like everyday correspondence from legitimate companies (for example, tracking messages from shippers). Thinking it’s routine, your colleague clicks the link and – to quote that college sportscaster – boom goes the dynamite. Your files are in lock-down.
What can your company do to thwart Cryptolocker cons?
Back (up) to square one. You’re probably tired of hearing it, but that won’t stop us from saying it: Back up your files now – and often. Have a conversation with your IT staff about how your company handles that. Some automated systems and cloud-based services are synchronized backups. That means if someone edits a file, the backup is overwritten, too. The bad news: If a malicious program encrypts the original, the synchronized backup will be locked, too. Work with your tech people to back up your files in a way that avoids that risk. Many experts advise companies against using a method that’s always connected to your system. For very small businesses and home offices, an external hard drive may be an option, but disconnect it when you aren’t actively backing up files. If the backup device is connected to your computer when Cryptolocker strikes, the program may lock those files, too.
Reduce the risk of “drive-by” downloads. Make sure your browser’s security setting is high enough to help fight off unauthorized downloads. For example, many experts recommend at least the “medium” setting in Internet Explorer.
Double extensions can spell double trouble. Downloading a file that ends with .exe can be particularly risky. So hackers try to hide what they’re up to by throwing in an extra extension that may look harmless – for example, .pdf or .jpeg. But a closer look reveals something like [name of file].pdf.exe. If you don’t read it carefully, you may focus on the routine .pdf and miss the potentially diabolical .exe. Here’s another tip. Some companies have set up their systems to hide file extensions. That may not be the safest choice. Talk it over with your tech team, but a better option might be to educate your employees about the risks of .exe files and then make extensions visible on your company’s computers. That way, rather than opening an iffy .exe file, your staff will know to alert IT to the potential threat.
Be stingy about issuing backstage passes to your network. Consider limiting administrative privileges to staffers who really need them. If malware compromises one of those VIP accounts, the damage can be even worse.
The best defense against Cryptolocker and similar threats is a box of donuts. Or a bag of bagels or a pot of coffee you share at the staff meeting you convene to spread the word about the Cryptolocker risk. Remind anyone with an office email account that instead of clicking a link in an unexpected message, it’s safer to type into your browser the known URL of the company the message claims to be from and then navigate to the information you need.
There’s no place like home. Cryptolocker also strikes personal email addresses, so follow the same sensible steps at home. Why risk tax records, school projects, or an irreplaceable gallery of family photos?
This article originally appeared on www.ftc.com
By Lesley Fair
February 18, 2014 – 2:05pm
To view the original post from the FTC visit: http://business.ftc.gov/blog/2014/02/lock-stock-and-peril