Among the famous ransomware threats, CryptoWall virus occupies a significant place. During its rampage on the Internet, it has collected more than $325 billion dollars worldwide. It managed to do so by employing elaborate file encrypting techniques which help it lock multiple files with different extensions at the same time. After the encryption process is complete, the threat presents the ransom message with the instructions to recover the files. If you also fell into the trap of this file-encrypting malware, concentrate on CryptoWall removal. It seems that this virus belongs to the same group of crooks who might be accused of CryptoDefense, Cryptolocker, BitCrypt, Critroni, and Cryptorbit, ownership. If you are a Windows user, you should be especially careful because CryptoWall virus is capable of infecting all Windows versions, including Windows XP, Windows Vista, Windows 7, and Windows 10. Right after it infects the system, it encrypts predetermined files and blocks the user so that he/she wouldn’t be capable of accessing them. According to PC experts, the RSA 2048 encryption is used for that. To restore these files, you will be asked to transfer $500 using digital currency Bitcoins. You might wonder why the developers of this ransomware are not caught already. One of the reasons is Tor network which guarantees the anonymity of the sender and the recipient. Nonetheless, we do not recommend paying the money. Instead, remove CryptoWall as soon as possible.
The original version has been already granted several “offsprings” 2.0, 3.0 or 4.0. CryptoWall 2.0 was updated at the end of 2014. It is capable of generating unique payment addresses for each of the victims. What is more, it has authentic gateways to TOR and uses the secure deletion method that doesn’t allow to use recovery tools while trying to decrypt important files. Cryptowall 3.0 was released in January, 2015. It seems that it is capable of encrypting new file names (HTML, PNG, TXT, URL), Soon afterward, Cryptowall 4.0 was released spring 2016.