The CryptoLocker Ransomware virus is not dead. It's still making its rounds, restricting access to infected computers and demanding payment before decrypting and recovering files.
LYNX Computer Technologies, Inc. Vice President Peter Mullenberg says his company has had recent run-ins with the Cryptolocker virus.
The CryptoLocker Ransomware virus is not dead. It's still making its rounds, restricting access to infected computers and demanding payment before decrypting and recovering files. One managed services provider (MSP) spoke with MSPmentor on a recent run-in with the destructive virus.
Lynx Computer Technologies, Inc., a recent winner of Datto's RockStar Awards, faced two instances where proper data backup and disaster recovery (BDR) and business continuity (BC) planning provided customers with a speedy recovery against the Cryptolocker virus.
Lynx Vice President Peter Mullenberg said the virus recently hit two of the company's customers: an engineering firm and a medical practice. According to Mullenberg, each customer can be classified as one of Lynx's larger customers.
These were two substantial small businesses where every file on their network was hit "due to the Cryptolocker virus, and so they were dead in the water," he said.
But, with the proper technology, Lynx was able to go back in an hour or two to restore their files, getting both customers up and running as quickly as possible.
In order to protect small and medium-sized businesses (SMBs) from the virus, MSPs must be able to leverage a BDR solution with flexible restoration points, he said. He noted that a solution that uses snapshot technology was "instrumental to getting these people up and running as quickly as possible."
The Cryptolocker virus infects via a typical action by an end user. For instance, an employee vists a legitimate website, clicks an advertisement, without knowing it was linked to a virus, and then every file is encrpyted on the server.
When the Cryptolocker virus hit last fall, Datto published a list of ways to recover from the virus on its website.
Follow CJ Arlotta on Twitter @cjarlotta for further updates on the story above.