Two months after the shutdown for version 2.0, a newly designed variant of the CryptoWall Trojan Horse has recently surfaced.  Users should avoid clicking suspicious email or website links and ensure they are fully patched and updated on AV protection.  Backups of data are always important and infected users should seek methods of decrypting files without paying the ransom fee which is approximately $500 

http://www.pcworld.com/article/2868972/cryptowall-ransomware-is-back-with-new-version-after-two-months-of-silence.html

QUOTE: Like its predecessors, the new version is being distributed through drive-by download attacks that exploit vulnerabilities in outdated browser plug-ins or through other malware already installed on computers, researchers from Microsoft said Tuesday in a blog post.

ADDITIONAL LINKS BELOW:

http://blogs.technet.com/b/mmpc/archive/2015/01/13/crowti-update-cryptowall-3-0.aspx

https://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/

http://malware.dontneedcoffee.com/2015/01/guess-whos-back-again-cryptowall-30.html

http://www.bleepingcomputer.com/forums/t/563169/after-a-brief-hiatus-malware-developers-release-cryptowall-3/

https://forums.malwarebytes.org/index.php?/topic/163485-cryptowall-30/