william p: The articles you referenced is an old one published in December 2013. I guess you have not kept up with developments.
In 2012 the Gameover Zeus botnet was turned loose. The botnet became the sole distribution channel for Cryptolocker. During the Summer of 2013 the malware was initially used against banks and financial institutions in numerous countries. The ransom demand varied between $10,000.00 and $40,000.00 USD. The financial institutions tried to keep it quiet. The US Department of Justice, US Department of Homeland Security, and the FBI started a joint investigation with the UK's National Computer Crime Agency, Interpol, and law enforcement agencies in Australia, Germany, France, Japan, and Ukraine. They were assisted by SecureWorks, a private computer security firm.
During the latter part of 2013 the attacks shifted from financial institutions to other businesses and eventually filtered down to consumers. There was entirely too much hype. At the time Symantec and several other companies added Cryptolocker to their anti-virus applications. Since then the better anti-virus applications can detect Cryptolocker and variations such as CryptoWall.
Meanwhile, forum threads and blogs were full of individuals who were hit by the malware. They were looking for solutions. The solutions which were proposed were not very good and usually did not work. The reason for that was that Cryptolocker kept making improvements to overcome the solutions. There is only one solution which I will get to in a moment.
On Monday, June 1st, 2014, the law enforcement agencies conducting the joint investigation swung into action. They took control of Gameover Zeus and Cryptolocker and shut them down. The administrator of Gameover Zeus was arrested. Since then there have been almost no or very few reports of Cryptolocker infecting computers. There are other smaller, less ambitious gangs operating that use variations but the number of infections has decreased dramatically.
One of the surprising things about Cryptolocker is how it was distributed. Fake emails, social media, and webpages with executable attachments were all used. Web sites like Disney, The Guardian newspaper in the UK, and Adobe were also used. Imagine a child visitng the Disney web site and clicking on a harmless looking link that initiated the trojan.
In the event a computer is infected there is one solution that works. The solution did not come from consumers. It came from the business enterprise sector - IT managers and IT techs. In the forums they were reporting successfull recoveries without any special applications or utilities while others were reporting unsucccessful recovery attempts. The difference between successfull and unsuccessful recoveries can be summed up with just a single word - Backups.
william - Based on your comments I'm guessing you are not thoroughly familiar with the Windows backup/restore features.
There are several types of backups performed by Windows. The one that needs to be done is the 100% full conplete backup for all drives connected to a computer. That way a copy of everything is saved. That means family photos, videos, games, and everything else is saved in case of an emergency. The backup must be written to an external storage device that is disconnected from the pc once the backup is complete. An emergency boot disc and the backup work perfectly.