CryptoLocker, a new form of ransomware, is targeting CSUN users. CryptoLocker primarily targets users via fraudulent email messages (with a ZIP attachment) purporting to originate from a "payroll department," UPS, DHS or FedEx and other legitimate organizations. Once the ZIP file is opened, CryptoLocker begins to encrypt computer files on the user’s computer and mapped network drives (e.g. anything with a drive letter). Once encrypted, the user is asked to pay a ransom fee for the encryption key and otherwise their data is lost forever. Cryptolocker can also be transmitted by visiting infected websites.
- Do not open attachments or emails from unknown/untrusted sources. If in doubt, do not open it.
- Do not browse to untrusted websites or click on suspicious URLs in email messages. If in doubt, do not click on it.
- Maintain current anti-virus software (Mac and PC) and up-to-date operating system and software patches.
- If you believe your computer is infected with Cryptolocker or another virus, immediately disconnect it from the network and contact the IT Help Center.
For more information, visit Microsoft's Malware Protection Center for Trojan: Win32/Crilock.A. You can also watch CryptoLocker in action.
If you have any question, contact the IT Help Center.