Cryptolocker: new malware encrypts your files, demands ransom within 96 hours

Status
Not open for further replies.
Small files that 99% of people are concerned with can be easily backed up to the cloud.

All I'm saying is that an automatic solution is infinitely better than a manual backup. No questions asked.

The best backup is one that's up to date and one you actually use.

How does one go about safely automatically backing up to Dropbox, for example. On my PC, I have a Dropbox folder which syncs with my Dropbox cloud storage. So, in the event of my PC getting infected by this malware and my files encryoted, wont the encrypted files from my PC Dropbox folder get copied to the Cloud also?

Whats the best way to avoid this?
 
How does one go about safely automatically backing up to Dropbox, for example. On my PC, I have a Dropbox folder which syncs with my Dropbox cloud storage. So, in the event of my PC getting infected by this malware and my files encryoted, wont the encrypted files from my PC Dropbox folder get copied to the Cloud also?

Whats the best way to avoid this?

Dropbox saves previous versions of files in case things go wrong, if memory serves. You can get them via the Web interface. I think it's up to 30 days history.
 
So in regards to using an external HDD for backing up larger amounts of data automatically, is there any good free options aside from Crashplan. I did check them out but they appear to only offer a free trial.
CrashPlan have a fully free version.

Their website doesn't really represent this for some reason (probably to get people to buy it) but their free version has no time limit or anything like that.

Haven't tried that before. Might as well check it out.

How does one go about safely automatically backing up to Dropbox, for example. On my PC, I have a Dropbox folder which syncs with my Dropbox cloud storage. So, in the event of my PC getting infected by this malware and my files encryoted, wont the encrypted files from my PC Dropbox folder get copied to the Cloud also?

Whats the best way to avoid this?
Store all your files on Dropbox. They'll be backed up online. If something like this messes them up, go to the Dropbox website and you can restore an older version of your files. Dropbox keeps many version in case something like this happens. A backup for a backup.

For even more security, backup your Dropbox to anther HDD using CrashPlan.
 
I see that Malwarebytes Pro blocks this before it can do any damage to your system but reviews of the program aren't very good (the on-access protection, I mean). What else would you guys recommend? I'm currently using Windows Firewall, MSE and NoScript and I haven't had a virus problem in years.
 
You don't need to click anything to get malware these days
you can get it through banners or any javascript executed on any website, just by opening the page

Guy asks how and if tablets can get malware. You respond with you can get malware just by opening a page and then a long rant about how PCs get malware. Let me ask again for the user--how do tablets get malware? Can tablets get malware? How much tablet malware is in the wild?
 
ugh, now i'm afraid to browse my favorite porn sites. what are the optimal noscript settings to allow me to browse bbw and milf porn with a minimal chance of getting my shit jacked?
 
I'm guessing System Restore wouldn't work? That's brutal
Posted this on the end of the last page -
System Restore creates regular restore points and maintains older copies of files using the Volume Shadow Copy service. This is the feature that allows you to restore previous versions of files (Right Click --> Properties --> Previous Versions). Some users have had some success restoring their files using this technique, or a utility called Shadow Explorer.

Many people do not have the Volume Shadow Copy service enabled, so I'd check.
I would not count on this as your only defense.
 
To be fair, one of the examples given in the reddit thread has a spoofed address from services@citibank, with the only hints to authenticity being the use of the receiver's email address ("Dear, crnaccravens" rather than "Dear John Smith"), some other aberrations in the body, and the attachment named as a .pdf with a pdf icon while it's actually an .exe.

It's certainly carelessness, but it's not exactly flagrant.

Hmm.

Should I warn my colleagues about this? Or let network guys deal with it?
 
everyone crapping on MSE should realize only 5 out of 49 AV's detected this virus as of yesterday morning.
As long as MSE is one of the 5, that's good enough for me.

I DON'T recommend AVG, especially the Free Edition. Almost totally nerfed my computer w/ a bad update, deleted graphics, plug and play, and sound drivers and forced me into two days of painful driver troubleshooting and a System Restore (which I've never had to use before then) to get everything back 100% again. Crazy part is last thing I did before all that shit was listen to some music on Youtube.

Got rid of it, best decision regarding AV I ever made.
 
I have been dealing with this damned virus at work since last week -_- (Desktop Support)

It sucks having to explain that the files are lost forever.

..or to pay for it. Might be the better choice in some cases. These guys were really smart in their "pricing", so almost every affected could afford it if they really wanted to.
 
Quick question on MB: Is the Pro version just a one-time purchase, or a subscription?

One time purchase. You might be able to find a voucher code to get it for cheaper too.

It always gives me popups on IP's it's blocked. Never affected me in a negative way so I don't think it has many false positives.
 
In addition to the old classic executable in the email trick there are some reports that it's being installed by way of Java exploits. Update your Java if you've got it, peeps.

And don't install the malware toolbar it'll try to foist on you when you do. Truly we in this modern world are singing the song of screwed.
When you update your java you also need to uninstall the old java versions otherwise they can still use the exploit.
 
One time purchase. You might be able to find a voucher code to get it for cheaper too.

It always gives me popups on IP's it's blocked. Never affected me in a negative way so I don't think it has many false positives.
Thanks. Done and done.

I was wondering what the difference was earlier when it said only the Pro version could block it, then I read up and realized the free version (which I've been using since time out of mind) doesn't do real-time scanning, which I never really considered before.

Better safe than sorry, IMO... $25 now is better than a potential $300 or lost files later on. I've got some stuff backed up, but it's mostly there in case of a hard drive failure.
 
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.
 
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.

I've known of them, I just haven't seen something like this before.
 
Thanks. Done and done.

I was wondering what the difference was earlier when it said only the Pro version could block it, then I read up and realized the free version (which I've been using since time out of mind) doesn't do real-time scanning, which I never really considered before.

Better safe than sorry, IMO... $25 now is better than a potential $300 or lost files later on. I've got some stuff backed up, but it's mostly there in case of a hard drive failure.
It's a brilliant piece of software.

Easily the best anti malware program I've used.
 
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.

I don't think any have been as bad as this. If you aren't adequately equipped/knowledgeable to block it or don't have a decent backup system then you're completely fucked
 
If they're deviously smart they save all the data people paid to unlock because that data is likely to contain something worth more than their pricing.

This thread made me buy MalwareBytes.
 
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.

The only common ransomware that I've seen is that Moneypak thing, and that's still possible to remove. Cryptolocker essentially destroys your files if you don't pay and it's a lot more serious than anything I see on a regular basis.
 
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?
 
Does Malwarebytes Pro completely replace MSE or should they be run at the same time?

could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?

It was mentioned in this thread earlier but yes, this can happen. Dropbox stores old versions of your files for 30 days so you're OK there. I'm not sure about Skydrive.
 
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?

It could probably encrypt your Dropbox files, but I think Dropbox keeps short-term backups so you could revert it? No idea about Skydrive.

Edit: Synonym posts?
 
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?

Probably, since the Dropbox/SkyDrive files are local on your computer which the malware would have access to. But on the bright side, I know that Dropbox support has the ability to roll back your entire Dropbox folder to a specific date if you want them to; all you gotta do is submit a support ticket.
 
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.

probably because this ransomware uses public-key cryptography against you. And if it encrypts files, they're baically unsalvageable even from mounting the hard drive in an external OS and using file recovery software on it.
 
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?

The podcast that someone here posted said that dropbox wasn't really safe but I would imagine it would be ok providing you don't have the actual program installed on your pc that gives access to it. I know nothing on stuff like this though so I am probably wrong.
 
I don't think any have been as bad as this. If you aren't adequately equipped/knowledgeable to block it or don't have a decent backup system then you're completely fucked

The only common ransomware that I've seen is that Moneypak thing, and that's still possible to remove. Cryptolocker essentially destroys your files if you don't pay and it's a lot more serious than anything I see on a regular basis.

This really isn't any worse than many others that have been around before. These types tend to be more rare, since usually they just lock your PC instead of actually encrypting the files, but this isn't really new by any stretch of the imagination. Though I'll admit that my views on this are heavily skewed since I used to analyse many different types of malware on a daily basis, almost like a religion; so I guess I've lost touch of how often the average user encounters this sort of thing, which is to say, not very.
 
The podcast that someone here posted said that dropbox wasn't really safe but I would imagine it would be ok providing you don't have the actual program installed on your pc that gives access to it. I know nothing on stuff like this though so I am probably wrong.

You're correct. If you use Dropbox/SkyDrive/Google Drive as file storage through your web browser ONLY (i.e. no PC client installed on your PC) the malware can't mess up your files, since there's no local copy on your PC to encrypt.
 
This really isn't any worse than many others that have been around before. These types tend to be more rare, since usually they just lock your PC instead of actually encrypting the files, but this isn't really new by any stretch of the imagination. Though I'll admit that my views on this are heavily skewed since I used to analyse many different types malware on a daily basis, almost like a religion; so I guess I've lost touch of how often the average user encounters this sort of thing, which is to say, not very.

Part of my job is dealing with laptops from all over the country and I see Moneypak ransomware and other viruses several times a week. Even if it's tough to clean, I can always recover all important files. Cryptolocker destroys these files for good unless the user has been backing them up (almost no one does this) so it's going to make me kind of miserable.
 
I'll go ahead and recommend the same piece of software that I always do in these types of threads:

Sandboxie

Spend just 5-10 minutes learning the basics of this program, and you'll never* have to worry about any sort of malware again. It's so secure that you could even download a sample of this ransomware and run it for fun. It's not going to be able to do much.

*99% secure. Nothing is 100% when it comes to PC security
 
Is there a known list of antiviruses that block this malware? Have all the big ones like AVG, Norton, Kaspersky etc updated their signature files?
 
I'll go ahead and recommend the same piece of software that I always do in these types of threads:

Sandboxie

Spend just 5-10 minutes learning the basics of this program, and you'll never* have to worry about any sort of malware again. It's so secure that you could even download a sample of this ransomware and run it for fun. It's not going to be able to do much.

*99% secure. Nothing is 100% when it comes to PC security
thanks for this link, I'll definitely put this on the parent's computer next time I'm up.
 
As I was typing up a warning email to my co-managers, just realized our entire network is infected. What a joy.

Seriously? What protection services did you guys have running in your PC or server's? Any firewall/antivirus applications? Hopefully you have a backup system running.
 
Is there a known list of antiviruses that block this malware? Have all the big ones like AVG, Norton, Kaspersky etc updated their signature files?

I was basically about to ask this. Has Windows Defender/MSE been updated to catch this? I'd rather not install a third-party anti-virus.
 
Is there a known list of antiviruses that block this malware? Have all the big ones like AVG, Norton, Kaspersky etc updated their signature files?

I was basically about to ask this. Has Windows Defender/MSE been updated to catch this? I'd rather not install a third-party anti-virus.

I've just uploaded a sample of this malware to Virustotal (it scans the file with a bunch of different AV engines and tells you if they detect the file). The results are here:

https://www.virustotal.com/en/file/...0a3c34fc2008e210ccfe6dae/analysis/1382805599/

Pretty much every AV, provided you have the latest updates, will detect it.
 
Status
Not open for further replies.
Top Bottom