Cryptolocker Ransomware Virus | FerrariChat

Cryptolocker Ransomware Virus

Discussion in 'Technology' started by the_stig, Nov 4, 2013.

This site may earn a commission from merchant affiliate links, including eBay, Amazon, Skimlinks, and others.

  1. the_stig

    the_stig F1 Rookie

    Sep 19, 2005
    3,497
    Just a heads up about the new ransomware called cryptolocker that is circulating:
    Method of transmittal: infected attachments to email or through website.
    Operation: infected .exe file encrypts user files including docs, pdfs, jpgs, etc. Displays ransom notice with countdown timer. If ransom is not paid before expiration of timer the private encryption key is deleted from the creator's server making recovery of the "locked" files just about impossible.
    Ransom: reports range from a low of $100 to a high of $2100.
    Removal: simple - most any antivirus program will flag it and remove it or there are numerous guides to removal online.
    Problem: removal of the virus does nothing to decrypt the locked files. Removal of the virus stops you from obtaining the key after paying the ransom. Virus spreads to mapped network drives encrypting as it goes. No way to decrypt files without paying the ransom. None.

    Prevention: a gentleman named Nick Shaw from Foolish IT, LLC. has written a free tool called Cryptoprevent for Windows pcs that creates several security policies to prevent the execution of the infected file.
    You'll have to google the link as the profanity filter here blocks it!

    Disclaimer: I have no association whatsoever with Nick Shaw or Foolish IT, LLC and know nothing about the operation or contents of his Cryptoprevent tool Use entirely at your own risk.
     
  2. RacerX_GTO

    RacerX_GTO F1 World Champ
    Silver Subscribed

    Nov 2, 2003
    14,743
    Oregon
    Full Name:
    Gabe V.
    #2 RacerX_GTO, Nov 5, 2013
    Last edited by a moderator: Sep 7, 2017
    Installed it for the heck of it, to see if it would blow my system up. Pretty painless

    I downloaded the executable, not the portable version. The download version gives you the option to receive updates (with a fee) and uninstall the protection Group Policy edits.
    Image Unavailable, Please Login
     
  3. Innovativethinker

    Innovativethinker F1 Veteran
    Silver Subscribed

    Aug 8, 2009
    9,840
    So Cal
    Full Name:
    Mark Smith
    Very deadly attack. You will pay them money or reformat your computer. Will also affect attached backup drives. Cloud backup should be safe.

    There are also copy-cat viruses out there as well.

    My systems haven't been hit, but others I know have been.

    Not fun.
     
  4. RacerX_GTO

    RacerX_GTO F1 World Champ
    Silver Subscribed

    Nov 2, 2003
    14,743
    Oregon
    Full Name:
    Gabe V.
    #4 RacerX_GTO, Nov 8, 2013
    Last edited by a moderator: Sep 7, 2017
    There's already been an update since I installed it that night. I opened the program, and did as shown below. I clicked update and it went and located and installed the latest update. But I had to click "apply" again to install it.
    Image Unavailable, Please Login
     
  5. the_stig

    the_stig F1 Rookie

    Sep 19, 2005
    3,497
    Yes there have been several. There is a version available for purchase that does automatic updates.

    The creators of cryptolocker are monitoring the threads on security sites like bleepingcomputer and reading the discussions on reddit and making changes in the virus. There are also copycats starting to appear.
     
  6. piratepress

    piratepress Formula Junior

    May 18, 2009
    722
    Mississippi
    Full Name:
    Chip A.
    The best prevention for something like this is external backups of any sensitive data you can't afford to lose! An external 2TB HD is $100 and worth it's weight in gold if something like this strikes!
     
  7. Wade

    Wade Three Time F1 World Champ
    Owner

    Mar 31, 2006
    32,793
    East Central, FL
    Full Name:
    Wade O.
    “Similarly, all the files in shared network drives that were connected at the time of the attack could also become encrypted and inaccessible.”

    Here’s a scary “what-if” (although real) scenario regarding CryptoLocker:

    They've taken my storage hostage ... now what? How one user device nearly brought down the business

    More info:
    CryptoLocker ransomware ? see how it works, learn about prevention, cleanup and recovery | Naked Security
    Cryptolocker Ransomware: What You Need To Know | Malwarebytes Unpacked
    CryptoLocker Ransomware Information Guide and FAQ
     
  8. the_stig

    the_stig F1 Rookie

    Sep 19, 2005
    3,497
    With one slight correction: the only safe backup is an external "cold storage" backup. If your external drive is connected and assigned a drive letter it will be encrypted along with your other files. If the previous backups are overwritten you are screwed.
    If you are using a cloud solution and have the client running the newly encrypted files will be happily backed up to the cloud overwriting the previous copies unless you have some form of versioning - storing multiple copies of the same files.
    Carbonite, one of the popular cloud solutions, has file versioning but it is not documented. Carbonite suggest disabling the client as soon as you realize that your files are encrypted. Contact support and tell them that you are a victim of cryptolocker and they will give priority to your ticket and help you get the previous un-encrypted files restored.
     

Share This Page