Skip to comments.
CryptoLocker: A particularly pernicious virus
Wndows Secrets ^
| October 24, 2013
| Susan Bradley
Posted on 10/24/2013 11:15:25 AM PDT by brityank
CryptoLocker: A particularly pernicious virus
By Susan Bradley on October 24, 2013
in Top Story
Online attackers are using encryption to lock up our files and demand a ransom and AV software probably wont protect you.
Here are ways to defend yourself from CryptoLocker pass this information along to friends, family, and business associates.
Forgive me if I sound a bit like those bogus virus warnings proclaiming, You have the worst virus ever!! But theres a new threat to our data that we need to take seriously. Its already hit many consumers and small businesses. Called CryptoLocker, this infection shows up in two ways.
First, you see a red banner (see Figure 1) on your computer system, warning that your files are now encrypted and if you send money to a given email address, access to your files will be restored to you.
(Excerpt) Read more at windowssecrets.com ...
TOPICS: Computers/Internet; Education; Hobbies
KEYWORDS: hackers; hostage; internet; ransom
Navigation: use the links below to view more comments.
first 1-20, 21-33 next last
WS does a pretty good job of keeping tabs on the Microsoft stable, and cleaning up most of its crap!
1
posted on
10/24/2013 11:15:25 AM PDT
by
brityank
To: brityank
2
posted on
10/24/2013 11:28:44 AM PDT
by
mreerm
To: mreerm
3
posted on
10/24/2013 11:30:54 AM PDT
by
leapfrog0202
("the American presidency is not supposed to be a journey of personal discovery" Sarah Palin)
To: All
I had this hit me. I reset the registry using the “restore” feature in Windows 7. Start in safe mode, then just reset the registry to a version previously saved. I went back 3 months.
Hope it helps somebody.
4
posted on
10/24/2013 11:31:30 AM PDT
by
Tracker47
To: brityank
good article brityank...anybody know if sandboxie protects from this??
5
posted on
10/24/2013 11:33:00 AM PDT
by
virgil283
(When the sun spins, the cross appears, and the skies burn red)
To: brityank
We got hit by this one. According to some victims, if you pay the money, they will decrypt your files as promised. Otherwise, you better hope that you have a backup, or you are screwed.
6
posted on
10/24/2013 11:41:38 AM PDT
by
Boogieman
To: Tracker47
That might stop the virus from running on startup, but it won’t decrypt any files that the virus has encrypted already. It seems to target Word and Excel files, and Adobe PDFs in some variants, and will even encrypt networks shares, if the infected computer has enough permissions to modify files across the network.
Luckily, the virus author did not set the virus “warning” message to display only after the encryption routine finishes. So, if you eliminate the virus as soon as you see the pop-up, you can probably stop it before it gets through all of your files.
7
posted on
10/24/2013 11:46:40 AM PDT
by
Boogieman
To: virgil283
The virus targets data files. So if you are running in a sandbox or VM environment, sure, you can reset your OS and not be infected anymore. However, any data files that it has encrypted will still be encrypted.
8
posted on
10/24/2013 11:47:56 AM PDT
by
Boogieman
To: brityank
So, what if I encrypt my files first?
Can they be re-encrypted?
9
posted on
10/24/2013 11:50:24 AM PDT
by
polymuser
("We have a right to debate and disagree with any administration!" (HRC))
To: mreerm
10
posted on
10/24/2013 11:52:37 AM PDT
by
brityank
(The more I learn about the Constitution, the more I realise this Government is UNconstitutional !!)
To: brityank
Public hangings are too good for the vermin perpetrating these crimes.
To: brityank
Whoever is doing that should be put away for life
12
posted on
10/24/2013 11:58:33 AM PDT
by
GeronL
To: brityank; rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; ...
13
posted on
10/24/2013 11:59:29 AM PDT
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: polymuser
14
posted on
10/24/2013 12:00:56 PM PDT
by
GeronL
To: polymuser
So, what if I encrypt my files first?
Can they be re-encrypted? Go read through the link that mreerm posted in #3.
It gives the following listing:
CryptoLocker will then begin to scan all physical or mapped network drives on your computer for files with the following extensions: *.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.pdf, *.eps, *.ai, *.indd, *.cdr, *.jpg, *.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c. When it finds a files that matches one of these types,it will encrypt the file using the public encryption key and add the full path to the file and the filename as a value under the HKEY_CURRENT_USER\Software\CryptoLocker\Files Registry key.
15
posted on
10/24/2013 12:01:40 PM PDT
by
brityank
(The more I learn about the Constitution, the more I realise this Government is UNconstitutional !!)
To: brityank
Almost as bad as the ObamaCare website
//kidding
16
posted on
10/24/2013 12:02:15 PM PDT
by
GeronL
To: brityank
Some advice from a guy who has been around this block a few times:
1. Back up frequently to an external drive that you turn off or disconnect afterward.
2. Keep personal data on removable media - thumb drives - and only keep temporary work copies on your hard drive.
3. If you get zapped by these clowns, slick your box, restore from your last backup and laugh at them.
To: polymuser
Yes, an encrypted file can be encrypted again.
To: brityank
19
posted on
10/24/2013 1:14:54 PM PDT
by
Sergio
(An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
To: brityank
Does it break of you create that registry key and set the permissions so the virus can’t write to it?
20
posted on
10/24/2013 1:21:03 PM PDT
by
tacticalogic
("Oh, bother!" said Pooh, as he chambered his last round.)
Navigation: use the links below to view more comments.
first 1-20, 21-33 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson