ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Like other types of ransomware, CryptoJoker encrypts the victim’s files and issues a decryption key once a ransom has been paid. This ransom is usually demanded in bitcoin to ensure the anonymity for the one holding your data hostage. The idea is to instill fear into the hearts of the victim, so that they make the rash decision to pay hackers for the safe return of their files. Ransomware is typically distributed via email phishing scams, and CryptoJoker is no different. Victims are infected through an installer that’s disguised as a PDF file.

ib cryptojoker

Once the user has installed CryptoJoker, the malware scans all drives connected to the infected device, including network drives. CryptoJoker looks for specific file extensions that will become encrypted. As reported by Bleeping Computer, the following file formats are targeted and encrypted by CryptoJoker:

  • .txt
  • .doc
  • .docx
  • .xls
  • .xlsx
  • .ppt
  • .pptx
  • .odt
  • .jpg
  • .png
  • .csv
  • .sql
  • .mdb
  • .sln
  • .php
  • .asp
  • .aspx
  • .html
  • .xml
  • .psd
  • .java
  • .jpeg
  • .pptm
  • .pptx
  • .xlsb
  • .xlsm
  • .db
  • .docm
  • .sql
  • .pdf

Though CryptoJoker isn’t widely distributed, it’s still a major issue that needs to be dealt with. The biggest problem with CryptoJoker is definitely the quality of its encryption. AES-256 encryption is heavy-duty, which makes it exceptionally difficult (and in most cases, impossible) to retrieve your data without paying the ransom. Supposedly, the only way to get rid of CryptoJoker is by contacting the developers and paying the ransom, so the key is to prevent it from ever infecting your network and data. If you do get infected by CryptoJoker, the solution will be relying on your data backup solution.

So, what can you do if you don’t have a backup of your data for this express reason? It needs to be understood that paying these criminals for the decryption key isn’t an option for your business. What guarantee do you have that they’ll make good on their promise and return your files to you? For all you know, they could take your money and run, leaving you with nothing but an empty wallet (we’ve seen this before with other ransomware). You should never trust a criminal to keep their word, and the developers of CryptoJoker are no different.

If you aren’t certain that your current security solution will protect you from threats like CryptoJoker, now is the time to contact ClearView IT. We can help ensure that your data is backed up properly, and equip your business with the defenses necessary to prevent the latest threats from entering your network. It’s crucial to do this before you get infected, because in cases like this, recovering the encrypted files is next to impossible.

For more information about how we can help you prevent CryptoJoker and other cyber threats, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Covid-19 Disaster Recovery Passwords Holiday Managed Service Windows 10 IT Support Browser Apps Cloud Computing Miscellaneous Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Saving Money Operating System Government Networking Gadgets Windows Workplace Strategy Artificial Intelligence Managed IT services Mobile Device Management App Virtualization Server Information Remote Spam WiFi Bandwidth Business Technology Encryption Blockchain Gmail Office History Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget Big Data Conferencing Access Control Health Data Security Analytics BDR Cybercrime Wi-Fi Help Desk Hacking Cost Management Employer-Employee Relationship Patch Management Vendor Document Management Hacker Remote Computing Remote Monitoring Save Money Voice over Internet Protocol Compliance IT Management Training Data loss Website Computing Vendor Management Search... Hard Drive Best Practice Retail Alert Legal Applications Hiring/Firing Outlook Data storage Money Project Management Password Vulnerabilities Customer Service Unified Threat Management Firewall Mobile Office Augmented Reality Word Managed Services BYOD IBM How To Router Running Cable VPN Storage The Internet of Things YouTube Update Twitter Law Enforcement End of Support Laptop Data Breach Printer Paperless Office User Antivirus Maintenance Windows 11 Social Monitoring Sports Travel SaaS DDoS Virtual Reality Chrome Healthcare Social Engineering Cryptocurrency Websites Remote Workers Black Market Mobility Meetings iPhone Cleaning Education Cortana Windows 7 Robot Mobile Computing Free Resource Google Maps Content Filtering Scam Marketing Solid State Drive Customer Relationship Management Processors Excel Solutions Co-Managed IT Entertainment Tech Terms Images 101 Chromebook Integration Drones Display Automobile Managed IT Digital Virtual Assistant How To Employees Wireless Technology Microchip Taxes Avoiding Downtime eWaste Flexibility Holidays HIPAA Processor Downtime Hack Safety Identity Theft Cooperation Video Conferencing Notifications Physical Security Unified Communications Virtual Desktop Virtual Machines Computer Repair Experience Google Docs Multi-factor Authentication Bluetooth Distributed Denial of Service Start Menu Professional Services Downloads Computer Care Office Tips Private Cloud Memory Vulnerability Saving Time PowerPoint Disaster Managed Services Provider Administration Software as a Service Data Protection Computers Bitcoin Presentation Virtual Private Network Politics Machine Learning Settings Lithium-ion battery Specifications Telephone IT Consultant Current Events Business Intelligence Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Business Metrics Point of Sale Hosted Solution Television Security Cameras Telephony Trends Supply Chain Management Securty Books Employer Employee Relationship Mobile Technology Value Cabling Devices Cyber security Domains Language Shortcuts Society Computer Accessories Customer Resource management Organization Fileless Malware Tablet Smart Devices G Suite Tip of the week Monitors Visible Light Communication Mouse VoIP Gamification Remote Working Reading Tracking Company Culture Regulations Trend Micro Be Proactive Windows 8 Telephone System AI Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Public Speaking Displays Advertising SharePoint Content Relocation Digital Payment Desktop Wasting Time Streaming Media Worker Accountants eCommerce Work/Life Balance Modem Workplace Strategies Tech Support Electronic Medical Records Videos Access Database Surveillance Keyboard Hard Drives Troubleshooting Time Management Public Cloud Managing Costs Health IT In Internet of Things Equifax SSID intranet Audit Media Spyware Tactics Development Wireless Hacks Hard Drive Disposal Employer/Employee Relationships Shortcut Network Congestion File Sharing Virtual Machine Heating/Cooling Writing Environment Username Reliable Computing Redundancy Reviews Windows XP Startup Optimization Freedom of Information Smart Technology Social Networking Navigation 2FA Cache Addiction email scam Teamwork Workers Mobile Security Hypervisor Business Owner Unified Threat Management Data Storage Scalability User Tip Shopping Administrator Legislation Text Messaging News Medical IT Proactive IT Printing Evernote Paperless Network Management Bring Your Own Device CCTV SQL Server Licensing Touchscreen PCI DSS Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Music Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Staffing Computing Infrastructure Azure Samsung Device security Managed IT Service IP Address Inbound Marketing Management Regulations Compliance Botnet Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Micrsooft Tech Human Resources Business Mangement Going Green Net Neutrality Rental Service Business Cards Tablets Flash Error Financial Data Bookmark Risk Management IT Telephone Systems Scams Business Growth Electronic Payment Competition Google Calendar Term Google Apps Download Recovery Supercomputer Piracy HTML Virus Telework Phone System Browsers Smartwatch LiFi Nanotechnology Communitications Banking Motion Sickness Microsoft 365 Cables Entrepreneur Google Wallet Application Deep Learning Comparison Google Play Google Drive Upload Procurement Documents Messenger Software License

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?