download_pdf_ijert
Authors :- Poli Sivasankar Rao , Malidevaraju Siva Sankar Raju.

Volume/Issue:  Volume 2 Issue 6

Google Scholar :-
 https://goo.gl/h6QMZb

Scribd :- 
https://goo.gl/g52kDe

Thomson Reuters :- https://goo.gl/3bkzwv

Attackers have developed a way to monetize files already on a victim’s computer. They accomplish this through en crypting select files and then charging for access to the key.\ This type of malware has spawned a new classification, cryptoransomware, but is more commonly known by the name of most prevalent version, Crypto Locker, or its variants TeslaCrypt and CryptoWall. This article will discuss how it works, how it happens, and most importantly what enterprises can do to protect themselves above and beyond IDS/IPS and antivirus systems. Prescriptive guidance for ba-sic prevention, detection, mitigation, and recovery controls is offered.
Keywords—Antivirus; Cryptoransomware; CryptoWal; TeslaCrypt; IDS/IPS; Malware;