Ransomware become one of the threats to watch out for in 2016, because this attack is very beneficial for hackers. Since April 2016, Kaspersky Lab has detected CryptXXX ransomware attacks against at least 80,000 netizens worldwide.
More than half are located in six countries: the United States, Russia, Germany, Japan, India, and Canada. However, these statistics are based on the users who have been protected by Kaspersky Lab detection technologies.
The worrying thing is the actual number of total users attacked by ransomware the perpetrator is certainly much higher.
The real figure is unknown, but experts Kaspersky Lab estimates that there may be a few hundred thousand users were infected.
Ransomware CryptXXX has the ability to infect thousands of PCs around the world and previously was not possible to fully decrypt files that are victims of this malicious program. However, now it is not an impossible thing.
To avoid attacks ransomware, Kaspersky Lab’s security experts suggest, if there is currently no decryption tools are available for versions of malware that encrypts files, never pay ransom to the hacker.
Keep the corrupt file and be patient. Probability decryption tools that appear in the near future is quite high. Kaspersky CryptXXX v.3 consider the case as proof of this suggestion. Some security specialists around the world are working hard to help victims of ransomware. Sooner or later the solution to most of ransomware victims would be found.
Suggestions from other Kaspersky Lab is proactively protect themselves from the outset. You do this by backing up data regularly on portable data storage media that is not constantly connected to the computer all the time.
Then install a good security solution. According to recent independent study showed that Kaspersky Internet Security is very good at detecting ransomware.
To note, after releasing the tool descriptions for the two variants of ransomware CryptXXX in April and May 2016, Kaspersky Lab again released a new decryptor for the encrypted files by the latest version of the malware’s various hostage-takers.