Just a bit of warning, new cryptowall 3.0 is doing the rounds. Seems to be in the form of an emailed .zip supposedly containing a CV being sent to business email addresses. From what I saw it just contains a .js file which could do anything. I didn't go any further into it than that.
http://blogs.technet.com/b/mmpc/archive/2015/01/13/crowti-update-cryptowall-3-0.aspx
http://blogs.cisco.com/security/talos/cryptowall-3-0
http://www.bleepingcomputer.com/virus-removal/cryptowall-ransomware-information#cryptowall3
Just had to tell someone that short of paying 1.75 BTC (US$ 500) over TOR/I2P he is not getting any of his files back. No backups...
Ah yeah, it also deletes any volume shadow copies and file history so if you don't have backups on a share not mapped to a drive letter or a usb drive not attached to your computer, your files are untouchable.
Bleeping computer has a tool that can identify cryptowall locked files.
Uses RSA2048 encryption so unless the good guys pop the servers and gain the private keys, it is highly unlikely to get broken.
Just sent out info to our company too as we have started getting these CV emails sent through even with FOPE/EOP/Office 365.