Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: TomGuy
You have to determine whether reconstructing the data would cost less than paying the ransome and possibly getting nothing in return.

Some of it cannot be reconstructed, ever. We are only finding out little by little what we've lost.

One saving grace is that attachments to Outlook e-mail files weren't affected, so any email hoarders may have copies of the files they need in one mail box or another.

Anything saved to the server subsequent to the attack is perfectly accessible. The different applications apparently work fine, and performance isn't seemingly affected.

Why were backups on the same server(s) as the data files? Why were servers not backed up/imaged?

Yeah, that's a question I have for our IT guy, who is a part-time contractor since we are such a small company. He "cleaned" our system of any remains of the malware, and suggested all users download and run Malwarebytes for their own stations and hard drives, but he could not answer the obvious questions you pose. Apparently, this is the situation with a lot of victims, so ours wasn't an unusual case of apathy.

How did the perps get the malware planted onto the system?

The malware comes attached to an innocuous looking email as a zip file. One click to open unleashes the malware. Since we are hiring a couple of positions, this one likely came in as a resumé in answer to one of the job ads. We've gotten several more like it since the infection, but users have been wise to it.

One thing I can't figure out is that our servers are supposed to have protection against such attacks that come through in any form. Does a zip file protect these viruses from detection?

We are definitely looking at more robust solutions going forward. We do have one intact saved exterior hard drive from about a year ago which wasn't attached to anything, so the only data that was lost is about a year's worth.

21 posted on 07/19/2015 7:07:26 AM PDT by fwdude (The last time the GOP ran an "extremist," Reagan won 44 states.)
[ Post Reply | Private Reply | To 18 | View Replies ]


To: fwdude
This infection takes advantage of standard practices just about everyone already has.

It has always made sense to have a backup drive mapped to your computer—this is the most common way to backup on a completely separate device. People then run a backup program that sends the backed up files to that device.

Unfortunately, any mass storage device connected to that infected computer will be encrypted, and the malware has the knowledge of extensions and file types to know there's data in those backups. Cryptolocker only keeps the Windows native files working because it wants you to boot up just enough to know how to pay the criminals.

This new infection has now alerted people to the need to have either multiple back up devices (which can be occasionally tested) or the need to create a special, separate FTP-type connection to send your backup file to (because Windows won't see it as a volume to easily infect).

This malware was a game changer.

37 posted on 07/19/2015 7:44:49 AM PDT by ConservativeMind ("Humane" = "Don't pen up pets or eat meat, but allow infanticide, abortion, and euthanasia.")
[ Post Reply | Private Reply | To 21 | View Replies ]

To: fwdude
Does a zip file protect these viruses from detection?

That depends on the various anti-virus/anti-spyware type software AND the configuration.

Some will scan inside zip files. Some will simply ignore them.

When I run Anti-Spyware on 'complete computer', it will scan inside the zip files on attacked USB drives. I can also configure it to run just on a specific partition or specified drives and/or directories.

==

I would have a serious discussion with the IT contractor. You may need a more robust IT service.
43 posted on 07/19/2015 8:06:40 AM PDT by TomGuy
[ Post Reply | Private Reply | To 21 | View Replies ]

To: fwdude

No IT guy/gal worth their salt would ever store backups on the server. That’s just stupid.

Find a new IT guy. And lock down your desktops. They are company property. Set up a good proxy and block known malware sites and vector sites. If it’s not needed for business purposes, block it!


82 posted on 07/20/2015 8:13:14 AM PDT by AFreeBird
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson