CryptoLocker UPDATE

BeckyStrause

Security Bulletin: CryptoLocker – UPDATE

Please note, this is VERY important information for each and every user to have.  Please take a few minutes to check it out and share this info with others.  It can affect anyone, but knowledge and staying on guard can help protect you.

The crooks behind CryptoLocker are dastardly! (And possibly brilliant!)

To recap, CryptoLocker is nasty ransomware that infects a computer, and connected drives, and encrypts the files.  Then a ransom is requested for the decryption key so the user can get his files back.  The ransom, payable via Bitcoins or MoneyPak, is usually around $300 for the first 72 hours.  Don’t worry about counting down the hours, CryptoLocker installs a countdown timer so the victim knows just how many minutes he has to pay the bribe.  The user’s choices are to either permanently lose his files or pay the $300.  Even if the actual malware is removed, the user’s files remain scrambled and inaccessible.

However, CryptoLocker has good news for anyone who has missed their 72-hour time limit.  For a measly $2,100 (approximately, based on Bitcoins current exchange value) the victim can still get a decryption key.  Lawrence Abrams from Bleeping Computer.com said, “They realized they’ve been leaving money on the table.  They decided there’s little sense in not accepting the ransom money a week later if the victim is still willing to pay to get their files back.”  So CryptoLocker has set up a dedicated decryption service where the victim can go after their ransom time limit has expired and buy a key to decrypt his files.

At this point, the best way to combat CryptoLocker is to have a good offsite backup.  Not just any backup will do, because it’s possible that even a user’s backup file can be encrypted by CryptoLocker.  But if a user has an appropriate offsite backup, he can let his captive files be deleted and use the backup.   This solution is much better than paying the ransom money and rewarding the captors.  The backup has to be set up before the attack happens, unfortunately hindsight doesn’t help with situations like these.

Today is not to late too be prepared, but tomorrow might be.  If you need to set up a backup to keep your files safe, or have questions about whether or not your backup is safe from attacks like these please contact Eberly Systems at 610-374-4049 or info@eberlysystems.com.  Also, if you suspect your computer has been infected with CryptoLocker or any other type of malware or virus, please contact us as soon as possible.  The longer you wait, the worse it can get.

For more insight and info on CryptoLocker, check out Krebs on Security or Bleeping Computer.

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers