Skip to content
Help Desk
  • Home
  • Information Technologies
    • Desktop Support & Management
    • Disaster Recovery (DR), On-Site & Off-Site Backups
    • Hardware & Software Sales
    • Help Desk, Onsite and Remote Support
    • Local Area Network (LAN) Installation & Support
    • PRO-Active Network Management
    • Server Support & Management
    • VoIP Telephony & Collaboration
    • Wide Area Network (WAN) Installation & Support
    • User Activity Monitoring
    • Managed Endpoint Detection and Response
  • Web Design & Development
    • Content, Messaging & Communication
    • Web Application Development
    • Website Design & Development
    • PRO-Active Website Management
  • Digital Marketing
    • Content, Messaging & Communication
    • PRO-Active Internet Marketing
    • Search Engine Marketing (SEM)
    • Search Engine Optimization (SEO)
    • Social Media Marketing (SMM)
  • Hosting & Cloud
    • Barracuda Virus & Spam Filtering
    • Offsite Backups
    • URL Filtering
    • Website, Email & Application Hosting
  • Computer Support
    • Backups & Recovery
    • Computer Repair & Service
    • Computer Sales & Service
    • esports
    • PRO-Active at Home

 

Intrada Technologies - Custom Solutions That Work

 

Help Desk
Contact Intrada
  • Home
  • About Intrada
  • Services
  • Knowledge Base
    • Thank You - Digital Marketing
    • Thank You - Multifactor Authentication
    • Thank You - Cybersecurity
    • Thank You - Virtual Events
    • Thank You - Microsoft 365
    • Thank You - Social Media
    • Thank You - Personal Identifiable Information
    • Thank You - Web Development
    • Thank You - Managed Service Providers
    • Thank You - Social Media Advertising for Business
    • Thank You - Google Analytics (GA4) - How the Update Benefits Businesses
  • Glossary
  • Careers
  • Home
  • Information TechnologiesRE-Active & PRO-Active
    • Desktop Support & Management
    • Disaster Recovery (DR), On-Site & Off-Site Backups
    • Hardware & Software Sales
    • Help Desk, Onsite and Remote Support
    • Local Area Network (LAN) Installation & Support
    • PRO-Active Network Management
    • Server Support & Management
    • VoIP Telephony & Collaboration
    • Wide Area Network (WAN) Installation & Support
    • User Activity Monitoring
    • Managed Endpoint Detection and Response
  • Web Design & DevelopmentAdaptive & Responsive
    • Content, Messaging & Communication
    • Web Application Development
    • Website Design & Development
    • PRO-Active Website Management
  • Digital MarketingSEO & SEM Strategies
    • Content, Messaging & Communication
    • PRO-Active Internet Marketing
    • Search Engine Marketing (SEM)
    • Search Engine Optimization (SEO)
    • Social Media Marketing (SMM)
  • Hosting & CloudLinux & Microsoft Solutions
    • Barracuda Virus & Spam Filtering
    • Offsite Backups
    • URL Filtering
    • Website, Email & Application Hosting
  • Computer SupportService & Repair
    • Backups & Recovery
    • Computer Repair & Service
    • Computer Sales & Service
    • esports
    • PRO-Active at Home
  • Home
  • Knowledge Base
  • Mike Clayton
  • Virus Alert: The Locky Virus

Knowledge Base

Home
Categories
Tags
Authors
Archives
Calendar
Categories:   All Categories
Suggested keywords
x
Search
Subscribe to blog
Unsubscribe from blog
  Print

Virus Alert: The Locky Virus

Information Technologies
Mike Clayton
Friday, 27 May 2016
Virus Alert: The Locky Virus

Locky VirusA new ransomware, Locky, has been discovered and is causing problems for computer users everywhere. The Locky ransomware encrypts your data files, locks you out of them and then demands .5 bitcoins to decrypt your files. This virus is particularly nasty due to its ability to encrypt files on unmapped network shares.

In addition to locking your files, Locky will completely change your file name, making it that much more difficult to restore the right data.

Worried about getting the Locky ransomware on your computer? Here are some more details about the virus:

  1. Locky is installed through email, particularly fake invoices Currently, Locky is installed through an invoice. You will receive an email with a subject containing an invoice and an attached document. When the document is opened, the text is scrambled and you will have to enable macros to make the text readable.
  2. The virus will encrypt your data The moment you enable macros within the file, Locky is on your computer. It begins to encrypt your data and change the file names. It will scan all local drives and unmapped network shares to find files.
  3. Recovery instructions will appear Your wallpaper will change to instructions on how to retrieve your data. This is the ransom note for your data. You will be instructed to visit a decrypter page, purchase bitcoins and send them to an address. Once your payment is made, you are provided the way to decrypt your files.

Locky is an easy trap to fall into because missing an invoice or not making a payment is something most people try to avoid. Remember to be conscious of emails from unknown senders, specifically when they have attachments.

If you do fall victim to the Locky virus, contact Intrada Technologies. Diagnostics are free at Intrada and Virus/Malware Removals start at just $69.95!

Responsive and Traditional Web Design
How do you Rate your IT Security?

About the author

Mike Clayton

Mike Clayton

Subscribe to updates from author Unsubscribe to updates from author Mike Clayton

Mike has been a member of the Intrada Technologies team since March 2014. He is currently serving as a Network Technician for Intrada with an emphasis on “In-Home” users.  He has a degree in Network Administration and Security, and has years of experience with Technical Support.  As an avid outdoorsman, Mike can be found wandering Pennsylvania’s great outdoors hunting and fishing when he’s not at home spending time with his family. mclayton@intradatech.com  570-321-7370 x 109   

 

Author's recent posts
More posts from author
Wednesday, 20 April 2016 QuickTime Exploit
Monday, 14 December 2015 The Big Phish

Contact Information:
  31 Ashler Manor Drive
  Muncy, PA 17756
 

Hours of Operation:
  Monday to Friday 8 AM > 5 PM EST
 

Get Directions
 800-858-5745
 
HELP DESK

OUR FOCUS

Intrada Technologies is a full-service web development and network management company with a focus on creating ongoing, trusted partnerships with each of our clients.

We make sure our clients have what they require to run their businesses with maximum efficiency and reliability, as many of their needs are mission-critical. 

Our unique, collaborative partnerships allow us to provide our clients with the assurance that we will be there when they need us.

CLIENT SERVICE TEAM

Quick Menu

  • Contact Intrada
  • Glossary
  • Help Desk
  • Knowledgebase
  • Services
  • About Intrada
  • Careers

Login

Intrada Secured Area for internal Staff resources.

  • Forgot your username?
  • Forgot your password?
Copyright © 2023 - Intrada Technologies - Privacy Policy

In order to provide you with the best online experience this website uses cookies. Delete cookies

Our website uses cookies and analytics to enhance our clients browsing experience. Learn More / I'm Good

Desktop Version
800-858-5745
Submit Ticket
Remote Control