Fortunately, the malware was poorly made, scrambling the data in the same way on every machine it affected free data recovery tools to quickly remove the malware was soon released. 90 days after infection, the data on the infected machine’s hard drive would be scrambled, and a ransom of $378 demanded, to be sent to an address in Panama. Malware that encrypts your data and then demands a ransom to decrypt it isn’t a new thing by any means one of the earliest examples of malware written with the sole aim of making money was the AIDS Information Trojan of 1989. Unfortunately, data recovery can be next to impossible without the key. Not to pay the ransom.CryptoLocker is a file-encrypting ransomware, and when it infects your machine, it encrypts the contents of the hard drive using RSA-2048 key, before demanding payment to decrypt the data. Infected and you find yourself without any back-ups, it is highly recommended
Limit the exposure of internal email addresses to potential hackers. Message Labs® and Mimecast can help create strict rules for incoming and outgoing emails to Using powerful email filtering systems like Spam Arrest which you can try Free for 30 days, Symantec.
Therefore, that should be your main point of defence against the The CryptoLocker malware is spread via email using social engineering