The most recent variation of the Crypto virus is proving successful in penetrating business systems due to the timing of the new variation and the delay in security vendors to provide updated security files to thwart the attempt. This variation continues to encrypt files on servers through drive mappings present on a computer or set of computers. As has been the case with past variations, typical virus and malware cleaners are unable to detect nor remove the threat. Once the files are infected (encrypted), the only path to a clean system is to restore from a backup solution.
Please be vigilant while working with files, corresponding through email and “surfing the web”. If a file looks suspicious, it most likely is. This latest variation disguises itself as an .mp3 file. Should you receive a file via email with an .mp3 extension, delete the email immediately and without hesitation. If you open a file and find your system compromised, unplug the network cable from your computer right away as a first course of action. Second, shut down your computer and notify our IT help desk.
Attempts to compromise systems will only increase in today’s world. The impact of these sophisticated attempts are real and can be extremely effective. We are doing everything we can to protect our systems but we need everyone’s help. If you are unsure about something, please do not hesitate to reach out and ask for guidance.