ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Like other types of ransomware, CryptoJoker encrypts the victim’s files and issues a decryption key once a ransom has been paid. This ransom is usually demanded in bitcoin to ensure the anonymity for the one holding your data hostage. The idea is to instill fear into the hearts of the victim, so that they make the rash decision to pay hackers for the safe return of their files. Ransomware is typically distributed via email phishing scams, and CryptoJoker is no different. Victims are infected through an installer that’s disguised as a PDF file.

ib cryptojoker

Once the user has installed CryptoJoker, the malware scans all drives connected to the infected device, including network drives. CryptoJoker looks for specific file extensions that will become encrypted. As reported by Bleeping Computer, the following file formats are targeted and encrypted by CryptoJoker:

  • .txt
  • .doc
  • .docx
  • .xls
  • .xlsx
  • .ppt
  • .pptx
  • .odt
  • .jpg
  • .png
  • .csv
  • .sql
  • .mdb
  • .sln
  • .php
  • .asp
  • .aspx
  • .html
  • .xml
  • .psd
  • .java
  • .jpeg
  • .pptm
  • .pptx
  • .xlsb
  • .xlsm
  • .db
  • .docm
  • .sql
  • .pdf

Though CryptoJoker isn’t widely distributed, it’s still a major issue that needs to be dealt with. The biggest problem with CryptoJoker is definitely the quality of its encryption. AES-256 encryption is heavy-duty, which makes it exceptionally difficult (and in most cases, impossible) to retrieve your data without paying the ransom. Supposedly, the only way to get rid of CryptoJoker is by contacting the developers and paying the ransom, so the key is to prevent it from ever infecting your network and data. If you do get infected by CryptoJoker, the solution will be relying on your data backup solution.

So, what can you do if you don’t have a backup of your data for this express reason? It needs to be understood that paying these criminals for the decryption key isn’t an option for your business. What guarantee do you have that they’ll make good on their promise and return your files to you? For all you know, they could take your money and run, leaving you with nothing but an empty wallet (we’ve seen this before with other ransomware). You should never trust a criminal to keep their word, and the developers of CryptoJoker are no different.

If you aren’t certain that your current security solution will protect you from threats like CryptoJoker, now is the time to contact ClearView IT. We can help ensure that your data is backed up properly, and equip your business with the defenses necessary to prevent the latest threats from entering your network. It’s crucial to do this before you get infected, because in cases like this, recovering the encrypted files is next to impossible.

For more information about how we can help you prevent CryptoJoker and other cyber threats, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Small Business Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Managed Service Provider Remote Work Internet of Things Saving Money Operating System Government Networking Windows Artificial Intelligence Managed IT services Workplace Strategy Gadgets Mobile Device Management Business Technology App Virtualization Blockchain Spam WiFi Server Information Remote Bandwidth Encryption History Gmail Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget BDR Health Big Data Analytics Conferencing Access Control Data Security Cybercrime Wi-Fi Employer-Employee Relationship Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Remote Computing Document Management Hacker Save Money Patch Management Vendor Compliance Remote Monitoring IBM Best Practice Website Computing Vendor Management Retail Mobile Office Hard Drive Alert Managed Services Hiring/Firing Data loss Outlook Password Legal Data storage Money Customer Service Unified Threat Management Firewall Applications Augmented Reality Word Project Management Search... BYOD Vulnerabilities Monitoring Storage Healthcare Websites Router Remote Workers Meetings Mobility The Internet of Things Windows 7 Free Resource YouTube Twitter Google Maps Scam User Law Enforcement How To Laptop End of Support Printer VPN Chrome Update Sports Travel Social Data Breach SaaS DDoS Virtual Reality Social Engineering Mobile Computing Cryptocurrency Paperless Office Black Market Antivirus Marketing Maintenance iPhone Cleaning Running Cable Education Cortana Robot Windows 11 Content Filtering Multi-factor Authentication Start Menu Professional Services Computer Care Solid State Drive Downloads Processors Vulnerability Saving Time Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Automobile Virtual Private Network Telephone HIPAA Current Events How To Wireless Technology Microchip Flexibility eWaste Excel Solutions Downtime Tech Terms Images 101 Integration Display Hack Safety Identity Theft Notifications Managed IT Digital Unified Communications Virtual Assistant Virtual Desktop Experience Employees Google Docs PowerPoint Bluetooth Administration Taxes Avoiding Downtime Distributed Denial of Service Office Tips Holidays Presentation Private Cloud Processor Memory Specifications IT Consultant Disaster Cooperation Video Conferencing Physical Security Customer Relationship Management Politics Virtual Machines Co-Managed IT Machine Learning Settings Computer Repair Entertainment Lithium-ion battery Banking Touchscreen PCI DSS Entrepreneur Google Wallet Licensing LiFi Documents Messenger Emergency Proxy Server Gig Economy Application Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Business Intelligence Computing Infrastructure Azure Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Securty Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Society Business Cards Tech Human Resources Domains Language Business Mangement Going Green Net Neutrality Error Financial Data Tablets Reading Bookmark Risk Management Monitors IT Troubleshooting Visible Light Communication Scams Windows 8 Supercomputer Piracy Google Calendar Term Google Apps Download Virus Telework HTML Relocation Browsers Smartwatch Public Speaking Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Tech Support Software License Streaming Media Comparison Google Play Work/Life Balance Google Drive Upload Procurement Social Network FinTech Keyboard Knowledge Data Analysis CES Hard Drives Corporate Profile Screen Reader IT Assessment Business Owner Point of Sale intranet Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Wireless Hacks Customer Resource management Organization Shortcut Network Congestion Cabling Devices Cyber security Shortcuts Reliable Computing Fileless Malware Heating/Cooling Writing Tablet Smart Devices Environment G Suite Tip of the week Social Networking Tracking Company Culture Windows XP Mouse VoIP Gamification Remote Working Telephone System AI Regulations Trend Micro Be Proactive Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Inbound Marketing Web Server Transportation Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint Text Messaging Content Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Videos Access Database Surveillance Electronic Payment Music Public Cloud Managing Costs Time Management Staffing Health IT Equifax SSID Audit Media IP Address Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships File Sharing Virtual Machine Phone System Botnet Username Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology Navigation 2FA Flash Cache Addiction email scam Teamwork Business Growth Workers Mobile Security Hypervisor Telephone Systems Unified Threat Management Data Storage Recovery User Tip Shopping Competition Legislation News Medical IT Computer Accessories Printing Evernote Paperless Network Management CCTV SQL Server

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?