Thanks for the link, NC.
Per the article, only paid users of Malwarebytes Pro versions have protection against their computers being infected by this virus. Free users have no protection, and will lose their files (or be forced to pay the ransom) if they're infected.
Here's an interesting tidbit about infection vectors from a link in the article:
CryptoLocker currently has the following infection vectors:1. This infection was originally spread sent to company email addresses that pretend to be customer support related issues from Fedex, UPS, DHS, etc. These emails would contain an attachment that when opened would infect the computer.
2. Currently dropped by Zbot infections disguised as PDF attachments
3. Via exploit kits located on hacked web sites that exploit vulnerabilities on your computer to install the infection.
4. Through Trojans that pretend to be programs required to view online videos. These are typically encountered through Porn sites.
So this thing isn't just being spread through email attachments. That makes the threat level a lot higher.
Your list of infection vectors pretty much covers the way any infection/malware arrives on a computer these days.
Thus far, I haven’t seen this in any of my business client’s computers nor among my friends who seem to rely on me for free computer support. At least with my business customers I view the lack of infection as an indicator that their current protection status is effective.
The following links cover most of Symantec’s information on the current class of randsomware: http://www.symantec.com/connect/blogs/ransomcrypt-thriving-menace and http://www.symantec.com/business/support/index?page=content&id=TECH211589.