CryptON ransomware is a virus which encrypts the files of the infected system and attaches the email protected extension to all the encrypted files. In reality, this ransomware is a version of Nemesis. Nemesis malware was first noticed in May 2017. Now, some people have been reporting that they have become victims of this latest Cypton ransomware. The ransom message is present in a file with HTML extension. The victim is asked to pay somewhere between $100 and $1000in Bitcoins as a ransom in order to recover their locked data.
Can the CryptON Ransomware Variant be decrypted?
Sadly, at present, the files encrypted by CryptON ransomware variant cannot be decrypted for free. Some software has a decryptor for the older variants of this ransomware, but they do not work with the latest version. The only way one can recover the locked files is through a backup.
How can you protect your device from CryptON ransomware?
If you want to protect yourself from CryptON ransomware or from any other ransomware, then it is vital that you have good computing habits and a robust security software like Norton. If you do not have Norton software setup on your device, then go to Norton.com/setup.
Firstly, you should always have a secure and reliable backup of all your stored data so that it can be restored in urgent cases.
Since this variant of CryptON is usually installed through hijacked remote desktop services, it is extremely crucial to ensure that it is locked down properly. Therefore, it means that there should not be any computers which are running remote desktop services directly connected to the Internet. Instead of this, put the computer’s running remote desktop after VPNs so they can only be accessed by the people who already have VPN accounts on the network.
Moreover, it is necessary to set proper account lockout guidelines in order to make it tough for accounts to be compromised over Remote Desktop Services.
It is also essential to have robust and reliable antivirus program which uses behavioral detection to fight with this ransomware. Norton security uses behavioral detection along with heuristics and signature detection. Software which has behavioral detection is very efficient in detecting and blocking out most of the ransomware. To activate Norton product key in order to prevent infections, visit www.norton.com/myaccount.
Lastly, here are some good computing practices which you must always follow:
- Always create backups in a secure location.
- Do not download attachments if you do not know the sender.
- Do not open attachments which come from suspicious sources.
- Scan all email attachments before downloading them.
- Make sure that you have installed all the given Windows updates as soon as they release. Also, keep other programs such as Flash and Java updated. Malware distributors exploit the security patches present in old programs. Hence it is vital to keep the programs up to date.
- Make sure that a reliable security program is installed on the device.
- Use strong passwords and do not store them in web browsers.
- Do not connect Remote Desktop Services directly to the net.