Email not displaying correctly? View it in your browser.
SilverPoint Systems Ltd.

An Important Warning for Everyone

Hello Everyone,

It is not common for us to send messages like this to our entire newsletter subscriber base, but at times we do feel it is in your best interest for us to do so.

I truly hope you will take a few moments, and review the information below.  Should it help even one person avoid falling victim to this issue, it will be time we consider well spent.  I encourage you to share this warning with your coworkers, friends & family. 

I would also recommend individuals take this time to discuss their backup solutions with their IT provider, whomever that may be.

Should anyone want to discuss their backup solutions, we are more than happy to do so, and would welcome your call.

While I have done my best to keep this as short, and to The Point as possible,I do know it can be a bit dry, and appreciate you taking time out of your day to review this message.

And finally, I would like to take this opportunity to say Happy Thanksgiving to each and every one of you.

Best Regards,

Rob Gjertsen
Director of Operations
SilverPoint Systems Ltd.
Phone: 604-200-2234

CyrptoLocker - A New Variant

Over the past few weeks, there has been a large outbreak of a new file encrypting ransomware strain, the new family of which is commonly referred to as CryptoLocker (aka Trojan:Win32/CriLock.A).

Like all file encrypting ransomware (also known as crypto malware), the ultimate goal of the attacker is to encrypt important data files on the victim's computer system, in an attempt to compel them to pay a fee to return access to their files.

Initial Infection

Based on our research, and gathered data, the spread of this infection is primarily being attributed to social engineering techniques (an email with an attachment is being sent to the user, who then opens it) and social media websites (users accessing applications on these websites seam to have a vulnerability).

Cleaning the Infection & Data Decryption

The infection itself is very easy to clean, however even after cleaning the original infection the data still remains encrypted.

Unfortunately, once the encryption of the data is complete, decryption is not feasible.  The recommended solution at this time, is to replace the encrypted files by restoring from a good known backup.

The infection will prompt you for payment, which they advertise as being a solution to decrypting your data.  We strongly urge any victims, to NOT do so - as these proceeds feed directly to organized crime.


Especially in cases when the decryption of encrypted data files is impossible, prevention is of the highest important.  A good offline backup, as well as having a good security protection in place, is imperative.

Should you have questions about the backup solution you are using, or are in need of having one setup, we would be more than thrilled to discuss your needs with you.