Raleigh, N.C. – The first thing Mark Wilson noticed was a drag on the computer system that he and five others used at his company.

"Everything was just crawling," said Wilson, president and co-owner of Apex Cary Insurance in Apex, N.C.

Wilson called Raleigh-based Petronella Technology Group, which asked if he noticed anything like a ransom note.

Sure enough, Wilson found a pop-up on one of the monitors asking for $300 in exchange for a key that would unscramble all of the business's files that it had encrypted.

Wilson's company had been hit by ransomware, which is a form of malware — or malicious software — that infects a computer and its connected systems, and then demands a payment. The attackers are likely criminal organizations based in Russia and Eastern Europe.

The company's digital files had been scrambled by Crypto­Locker, a version of ransomware that first appeared in September. It has since infected about 25 million systems across the globe, about 70 percent of which are in the United States, according to Keith Jarvis, senior security researcher with the Dell SecureWorks Counter Threat Unit.

CryptoLocker appears to be spreading through e-mails that lure victims into opening them, according to a November alert issues by the U.S. Department of Homeland Security's Computer Emergency Readiness Team.

The CryptoLocker infections offer a glimpse into criminal organizations that work together, using the Internet to gain personal information in order to sell it or use it to steal from bank accounts.

Ransomware has been around for years, but untraceable and unregulated virtual currencies have fueled increasing attacks, according to a McAfee Labs report on 2014 threat predictions.

Defense options, the report and experts said, include not opening suspicious e-mails and keeping antivirus software and patches current. An effective computer file backup structure also will minimize risk.

Dell researchers, Jarvis said, have observed Crypto­Locker being distributed through cyber criminals working together to mine personal data using different malware, such as botnets — a network of infected machines that communicate with controlling cyber criminals.

Gameover Zeus, one of the most notorious and sophisticated botnets involved in online banking fraud, is distributed by the Cutwail spam botnet, which uses e-mail attachments to lure users. After an attachment has been opened, Upatre malware downloads and then executes Gameover Zeus, which brings in other malware families, including CryptoLocker.

Dell SecureWorks has seen variants of Zeus go after small and medium-sized businesses because they are usually less secure, said Elizabeth Clarke, a spokeswoman for Dell SecureWorks.

CryptoLocker victims should take an inventory of their files and have off-site backups available to recover infected data. It's easy to remove CryptoLocker, Jarvis said, but the machine could still be hosting Gameover Zeus and other malware.

"Everything on the machine is suspect," he said. Infected equipment should be taken to a professional, who can reinstall the operating system from a clean source.

Craig Petronella, president of Petronella Technology Group, has seen three small businesses hit with Crypto­Locker since October, and each company has spent about $300 to save their data.

Petronella learned about CryptoLocker after Jerry Hall, who owns Total Systems Heating & Cooling in Spring Lake, N.C., with his wife, Brenda, shared his concerns about a pop-up on his computer.

Petronella got into the Halls' computer system and found instructions for making a payment. The pop-up also set a deadline: ignore it and Crypto­Locker would permanently encrypt all of the Hall's files.

"It's a ticking timer," Petronella said. "And it's counting down."

FBI spokeswoman Jenny Shearer wrote in an e-mail that they advise against paying the ransom. Jarvis and Clarke agreed, pointing out that people are funding criminal organizations.

"Sometimes people have their back against the wall, and it is the data for their company for the last 10 years," Jarvis said.

The Halls used USB hard drives as a backup system, Petronella said, which were also infected by CryptoLocker because they were connected to the company's server.

"It wiped me out completely," Brenda Hall said. "If I didn't pay the ransom, it would be thousands of dollars in reconstruction."

CryptoLocker requires payment via Bitcoin or Money­Pak, both untraceable forms of digital currency that can be obtained at major retailers.

Petronella paid the ransom with a $300 MoneyPak card he had purchased on behalf of the Halls.

Within about 20 hours, the hacker group sent the key to start the decryption process. The following day, Petronella found a note indicating the antivirus program deleted the malware and stopped the decryption process.

"We thought we were going to have to pay again," he said.

They later received instructions on how to re-download the virus from Ukraine to continue the process, which they did.

Petronella reported the incident to the FBI, which is recommended. He also researched the virus and sent a note to his clients recommending changes and caution.

Wilson remembers reading that e-mail and thinking, "Yeah, right. Sure. That happens to who? Not me."

Just over a week later, Apex Cary Insurance was hit with CryptoLocker.

Wilson and his team talked for about two hours about whether they should pay the ransom. But there was too much to lose, including 10 years of documentation.

After losing more than a day's worth of work, Wilson decided he needed to get back to his business.

"The quickest, easiest way to handle this was to pay," he said.