{"id":144852,"date":"2016-01-05T09:32:00","date_gmt":"2016-01-05T14:32:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/cryptojoker-is-no-laughing-matter\/"},"modified":"2016-01-05T09:32:00","modified_gmt":"2016-01-05T14:32:00","slug":"cryptojoker-is-no-laughing-matter","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/cryptojoker-is-no-laughing-matter\/","title":{"rendered":"CryptoJoker is No Laughing Matter"},"content":{"rendered":"

New Ransomware Demands Ransom in Bitcoins to Get Your Files Back<\/strong><\/h1>\n

\"cryptojoker\"With a new year comes new challenges, new hopes, new resolutions, and of course, new ransomware. The newest discovered ransomware called Cryptojoker proves to be anything but amusing to its victims, and although it doesn’t appear to have been widely distributed as of yet, it is an entirely functional ransomware that could see increased distribution in the future.<\/p>\n

Beware of unknown emails<\/strong><\/p>\n

IT security experts cannot stress enough how important it is NOT to open emails from unknown sources, but sometimes, the curiosity of these mystery emails is just too much for us to resist. That being said, it is thought that because this ransomware is being disguised as a PDF file, it is more than likely that CryptoJoker is being distributed via email phishing campaign, and you can bet that the subject is not <\/u>“the PDF file attached to this email is just ransomware in disguise”<\/em>. Unfortunately, these cybercriminals are a lot smarter than that.<\/p>\n

How it works<\/strong><\/p>\n

CryptoJoker uses AES-256 encryption that demands a ransom in bitcoins to get your files back, and once the installer is executed, it will download or generate several executables in the%APPData% folder and  %TEMP% folder. Each of these files will perform several tasks that include:<\/p>\n