Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Ransomeware attack, need advice
self | 07/16/15 | fwdude

Posted on 07/19/2015 6:34:05 AM PDT by fwdude

I have recently had the unpleasant experience of having one of the new variants of the cryptolocker malware infect our computer servers at work. In case someone doesn't know, its a computer worm that encrypts all the standard-format files on a system so that the use can't open the file without a "key," supplied by the hacker for a ransom.

My question, which I have researched extensively over over the internet, is whether it is advisable consider paying the ransom, if there is enough "honor among thieves" to trust that the files will be unlock if I pay, and if there might remains some residual malware that might reinfect our computers.

And, no, there are no backup files that were untouched, the backups were infected as well.

Some of the files are critical, or at least would take an enormous amount of work to recreate or recover otherwise. Do you consider the risk worth the reward?


TOPICS: Computers/Internet
KEYWORDS: computers; computing; cryptolocker; internet; malware; ransomware
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-85 next last
To: fwdude

Did you try an old restore point ?


41 posted on 07/19/2015 8:01:27 AM PDT by molson209 (Blank)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BuckeyeTexan

Kaspersky Rescue Disk 10


42 posted on 07/19/2015 8:05:08 AM PDT by molson209 (Blank)
[ Post Reply | Private Reply | To 24 | View Replies]

To: fwdude
Does a zip file protect these viruses from detection?

That depends on the various anti-virus/anti-spyware type software AND the configuration.

Some will scan inside zip files. Some will simply ignore them.

When I run Anti-Spyware on 'complete computer', it will scan inside the zip files on attacked USB drives. I can also configure it to run just on a specific partition or specified drives and/or directories.

==

I would have a serious discussion with the IT contractor. You may need a more robust IT service.
43 posted on 07/19/2015 8:06:40 AM PDT by TomGuy
[ Post Reply | Private Reply | To 21 | View Replies]

To: fwdude
I suggest you Google the problem and you'll find a number of potential solutions available. Example.
Try them all - you might get lucky.
44 posted on 07/19/2015 8:12:34 AM PDT by oh8eleven (RVN '67-'68)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Grampa Dave
?After, you get rid of the malware, install a Chrome Browser, save your data on a cloud, and buy Chrome Desktops for your people.

Because everyone knows that there is no downside to giving Google more power.

45 posted on 07/19/2015 8:17:32 AM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 23 | View Replies]

To: fwdude

Cryptolocker hit my servers last year and I had good backups that could be restored. Experts told me the best defense are good backups for Cryptolocker can bust even the best Anti-Virus software.

I had Kaspersky on my servers and Crypto busted one of them to infect a few drives. I switched to Eset afterwards though.

In your case, I would pay since your backups are infected too. You can’t unlock the virus since it has 256bit encryption. Sorry, anyone selling a solution is lying.

After you get your files back, then invest in better backups for if you had a decent backup system, this wouldn’t be a problem. Also, teach users on the network to not open strange attachments in email messages.


46 posted on 07/19/2015 8:19:54 AM PDT by WildWeasel
[ Post Reply | Private Reply | To 1 | View Replies]

To: fwdude

You can get probably rid of it. Since your entire network is infected, it is going to take time because each system on the network has to be taken off line (put into isolation) and repaired individually. This involves safe booting with nothing loaded except the basic drivers needed to explore the drives, removing the infection reference link(s) from the startup list (you can get there from msconfig), removing the infection itself (usually there are multiple files because they are designed to reinfect if you don’t get all instances), and then removing the infection commands within the registry by manually searching for references to the infected file names and deleting all instances in the registry.

You need to keep notes about infected files names and dates as you work at this. It helps to know when the infection started. The infected files typically have long names made of random characters and tend to be in hidden cache areas of the user who infected the system originally. The exe files of the infection have no corporate name associated with them when looking at them in the startup list, and usually they are the most recently added to the list.

Cleaning out ransomware will take about 1.5 to several hours, just depending on how many instances of the infection are on the system. If you are not meticulous in cleaning, you can easily reinfect the computer when you reboot, so it is always best to reboot in safe mode and recheck your startup file list and registry until you are sure no more instances of the ransomware are running and it is safe to boot normally.

As soon as you get some control of the system, you need to turn off Java from the control panel, because outdated Java is usually what allows ransomware infection to take over. Normally you don’t need to have Java turned on anyway, so it should always be off until needed.

Be aware that simply turning off ransomware is not the same as removing it, and your infected systems will continue to be carriers and will likely spread the infection to any new system they connect to. So it is best to actually clean out the infection.


47 posted on 07/19/2015 8:20:46 AM PDT by Kirkwood (Zombie Hunter)
[ Post Reply | Private Reply | To 1 | View Replies]

To: fwdude

What ConservativeMind said is right, get a CD of the type he mentioned and run it. When Windows is running, most contemporary viruses and such have the ability to shut down not only your anti virus, but any application Windows can use to defeat it. I’ve seen them shut down msconfig, registry editor, services editor, even task manager, so you couldn’t shut down specific processes.

In that case the only option is to run anti virus and malware scans from a bootable CD, so the operating system is not running, therefore the software installed cannot run since it is placed in the Start Up routine and runs before even the antivirus is loaded.

It may also be possible to recover data by the same method, while running from a bootable CD instead of Windows. I don’t know if this type of malware actually encrypts files, or just acts like it does while the software itself is running. Like some I’ve seen that try to make everything in the Windows folder write protected, but boot to a CD and that attribute can be changed or it acts normally while the malware is not running.

I don’t have any of the newer ones, mine is at least 10 years old, I got out of the computer repair business a while back. 15 years of it and I got burned out on that, and it was getting to the point it was usually better to just reinstall than try to locate and fix crap like this.

And consider setting up a Linux server and possibly a Linux hardware firewall. The workstations behind it can run Windows with no trouble, but putting Windows on a server that is the connection to the Internet is literally advertising for trouble. Windows has an application that allows remote connections. As long as it is enabled, it’s sitting there waving its arm around yelling “here I am”...Remote Assistance Service should always be disabled for a server connected to the internet...It’s useful inside the network, but a problem when exposed to the internet.

The difference is Linux never allows Administrator access. You have to enter a password to install any software, period. Software cannot install itself. Some viruses have been written specifically for Linux, but they don’t get far for that reason. It’s difficult to infect one computer, but not impossible, but 99% of Linux machines will not let it install.

You can also get specific Linux versions that act strictly as a firewall, or server, print server, you name it. And a lot of them can run on older equipment newer Windows versions would laugh at. My first attempt at Linux was a Pentium 233MMK machine, Mandrake 8 ran great, Windows XP wouldn’t even install on that machine. XP required 400MHz minimum, and ran like a dog on that. So you could actually get an older 1GHz machine with 512MB RAM, make sure it has good hardware, set it up as a Linux hardware firewall, and it would run fine. That still wouldn’t stop software of this type getting in through email, the best antivirus in existence can’t stop them all.

Distro Watch is a good place for info

http://distrowatch.com/

Use an external hard drive for backups, and unplug it the minute the backups are finished. If you use a computer, keep it disconnected from the internet. Even connected internally to a network is risky, it can be infected from other workstations. That’s why an external hard drive is best. With 2 TB and larger available, they are usable for backups these days. Mine for pictures is 1.5TB...always unplugged except while transferring.


48 posted on 07/19/2015 8:22:37 AM PDT by Paleo Pete (If you had everything...where would you put it?)
[ Post Reply | Private Reply | To 35 | View Replies]

To: fwdude

Pay the ransom once, then pay it twice, then a third time. Soon you’ll realize that your business now has a new partner that you can’t get shead of and that doesn’t do anything for the business but take.


49 posted on 07/19/2015 8:52:59 AM PDT by fella ("As it was before Noah so shall it be again,")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bernard; fwdude
“Hitman” worked for the DOJ page-locker. I don’t know about this one.

Ditto. I now keep Hitman Pro on a thumbdrive that travels with my laptop.

50 posted on 07/19/2015 9:00:55 AM PDT by Rodamala
[ Post Reply | Private Reply | To 10 | View Replies]

To: fwdude

It’s a problem... I didn’t realize that it was a multiple computer problem. All it takes is one weak link to gain trust thoughout the whole network you have if it isn’t adequately firewalled through a server.

In my old company, for a long time we had both a local peer to peer intranet in the company combined with independent, multiple access to the internet. It was an accident waiting to happen, although fortunately it didn’t, and the system was eventually modernized.


51 posted on 07/19/2015 9:04:21 AM PDT by Pearls Before Swine
[ Post Reply | Private Reply | To 33 | View Replies]

To: fwdude

If the price is not too high, I would pay.


52 posted on 07/19/2015 9:18:34 AM PDT by UnwashedPeasant (A slave is one who waits for someone to come and free him.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DiogenesLamp

Because MS is so ‘good’ to its end customers!


53 posted on 07/19/2015 9:38:56 AM PDT by Grampa Dave (Rev. 22:11 Let the evildoer still do evil, the filthy still be filthy, the righteous still do right!)
[ Post Reply | Private Reply | To 45 | View Replies]

To: mountainlion

I had problems with Download.com about a year ago. Long-story-short, I had to reformat and reinstall. It may not be their fault but they are not protecting their clients.


54 posted on 07/19/2015 10:25:09 AM PDT by grayeagle
[ Post Reply | Private Reply | To 9 | View Replies]

To: tacticalogic
And I can;' believe you actually BELIVE THAT ?
Or are you one of the hackers who just loves WINDOWS Operating System's Security Flaws ?
APPLE Users don't have that problem.
But it took me my entire military career to learn that.
55 posted on 07/19/2015 2:35:40 PM PDT by Yosemitest (It's Simple ! Fight, ... or Die !)
[ Post Reply | Private Reply | To 40 | View Replies]

To: fwdude

The first time I received a ransomeware “lock”, I took my laptop to a local repair shop. He fixed it, and added Malwarebytes and “CleanUp”. The second (and third) time, I popped out the battery, drained what charge remained, and got back onto the Internet and FR!


56 posted on 07/19/2015 2:53:56 PM PDT by Does so (SCOTUS Newbies Will Imperil America...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yosemitest
APPLE Users don't have that problem. But it took me my entire military career to learn that.

Your solution to any Windows problem is to replace it with Apple, which in the context of this problem isn't going to help one bit. If the problem is indeed on the servers then there's nothing "Apple" to replace it with. Apple abandoned the enterprise server market years ago to pursue their fortune in pocket toys.

Beyond that, it isn't going to do anything to get the data back. I think you'd rather see the data lost so that it can be blamed on Windows than to see it actually get recovered.

57 posted on 07/19/2015 3:34:44 PM PDT by tacticalogic
[ Post Reply | Private Reply | To 55 | View Replies]

To: tacticalogic
Data lost?
A professional can recover it !
Your poor attempt to continue to "SELL" the VIRUS and "THEFT RIDDEN" WINDOWS OPERATING SYSTEM, is hollow.
Of course business can convert to Apple,
and they can do it to secure their Enterprise Assets,
or continue to be pouring good money after bad.

58 posted on 07/19/2015 3:46:59 PM PDT by Yosemitest (It's Simple ! Fight, ... or Die !)
[ Post Reply | Private Reply | To 57 | View Replies]

To: Yosemitest
Of course business can convert to Apple

This is from 2011:

Apple doesn't even have Apple servers in their own data centers.

59 posted on 07/19/2015 3:55:31 PM PDT by tacticalogic
[ Post Reply | Private Reply | To 58 | View Replies]

To: tacticalogic

You DO KNOW it’s 2015, don’t you ?


60 posted on 07/19/2015 4:15:29 PM PDT by Yosemitest (It's Simple ! Fight, ... or Die !)
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-85 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson