

However, there are two best approaches that can be taken to defend system resources. A strong anti malware program can defend against such attacks. There is plethora of ways to defend corporate network resources from infection. This is a more secure form of encryption since only one party has the private key.Ģ. These keys are used for decrypting and encrypting messages.

Asymmetric encryption is used to encrypt victim’s files (Tripathi & Agrawal, 2014). After establishing connection to that server it deposits asymmetric private encryption key.

After infection, Crypto locker swiftly connects to command and control server of the attackers. Mapped network drives could become infected if a single computer on an entire network becomes infected. Crypto locker has a unique ability to search and encrypt files that are located within USB drives, cloud storage drives, external hard drives, and network file shares and shared network drives ("CryptoLocker Ransomware Infections", 2018). Computer or any software in that system keeps on functioning normally however personal files such as images, spreadsheets and documents are encrypted. Most of the ransomwares just freezes a system and demands a fee but crypto locker is a different kind of ransomware which infects personal files. Users need to pay certain amount to ensure access to those infected files. The basic definition of ransomware states that it is software which is specifically designed block access to some files (Scaife et al., 2016). Crypto locker is a type of malicious program known as a ransomware.
