BANGALORE, INDIA: Researchers at eScan have detected and analyzed a new offline Ransomware 'Trojan.Cryptolocker.AT' targeting Windows users in Russia, which doesn't need any interaction of Command and Control Server.
- Use trustworthy antivirus software on regular basis, which will protect your system from malwares.
- Configure your antivirus settings to automatic system updates.
- Disable Auto-play of USB and Optical drives such as Pen drive, External Hard Disk and CD/DVD.
- Configure your firewall to default configuration, i.e. deny all incoming connections and only allow services which you explicitly want to offer to outside world.
- Turn off file sharing if not needed.
- Implement a three dimensional security policy in your organization, i.e. firstly understand your requirement based on which IT Security policy would be prepared accordingly. Secondly, educate your staff about the policy and finally enforce the policy.
- Make sure you either implement MailScan at gateway level or enable Mail Anti-virus on endpoint in order to block extensions such as *.EXE, *.SCR, *.JS, *.VBE etc. These attachments would infect your system.
- Open emails only if you are positive about the source.
- Disable Auto-play to stop automatic launching of files from the network and removable drives.