Blogs and Posts

Microsoft Announced ZCryptor Ransomware – What You Should Know
- By: Garry Feldman
- Date: June 1, 2016
On May 26th, Microsoft alerted users warning of a new strain of Ransomware called ZCryptor, which works like a worm and spreads via network and removable drives affecting more users. This ransomware is malicious software that encrypts computers typically via fake installers like Adobe Flash, malicious spam, or bogus macros in MS Office documents.
Pull the Plug
Upon entry into the unsuspecting user’s computer, ZCryptor encrypts the user files. The ransomware actually distracts the user by displaying a popup, which confuses the user and creates time for the malware to run. The popup continues to appear while the malware is encrypting the computer. If you see the popup below, pull the plug on your computer.

Worrisome Worms
ZCryptor’s ability to spread itself to nearby targets marks it as a first of its kind. This is particularly worrisome because so many devices on a network can be infected in one go. Microsoft reported that the ransomware targets 88 types of files and that number is growing as ZCryptor continues to mature.
Once the encryption is complete, ZCryptor’s ransom message is revealed which asks for $500.

Don’t Spend a Penny & Minimize Downtime
There is no identified way for ZCryptor affected users to recover their files for free, unless they have a secure backup. Users with secure backup and disaster recovery solutions such as Datto, can be restored in minutes without paying a penny. U.S. Computer Connection helps business and healthcare in Connecticut and New York with IT consulting which includes secure backup and disaster recovery. For user education and to learn more about ransomware register at uscomputer.com/events for Ransomware, June 7th.
White Papers
-
Ransomware E-book
The Business Guide to Ransomware.
-
IT Move: Soup to Nuts
Take a look for IT Move Project Planning.
Blog Archive
Blog Archives
- June 2019 (1)
- May 2019 (1)
- April 2019 (1)
- December 2018 (1)
- November 2018 (1)
- September 2018 (1)
- August 2018 (4)
- July 2018 (5)
- June 2018 (7)
- May 2018 (5)
- April 2018 (5)
- March 2018 (5)
- February 2018 (4)
- January 2018 (5)
- December 2017 (6)
- November 2017 (5)
- October 2017 (6)
- September 2017 (6)
- August 2017 (4)
- July 2017 (4)
- June 2017 (6)
- May 2017 (4)
- April 2017 (6)
- March 2017 (4)
- February 2017 (5)
- January 2017 (5)
- December 2016 (5)
- November 2016 (5)
- October 2016 (4)
- September 2016 (6)
- August 2016 (4)
- July 2016 (7)
- June 2016 (7)
- May 2016 (6)
- April 2016 (5)
- March 2016 (7)
- February 2016 (5)
- January 2016 (5)
- December 2015 (6)
- November 2015 (1)
- October 2015 (2)
- August 2015 (5)
Categories
- Backup and Disaster Recovery (12)
- Business IT (73)
- Security (5)
- Security Tips (71)
- Training (35)
- Uncategorized (5)
- Webinar (28)