Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 24 September 2013

Fighting The Destructive Cryptolocker Ransomeware

Posted on 15:04 by Unknown
A panicked call came in this morning from a corporate client reporting that there were files on their file server that couldn't be read because of a message reporting an invalid file type for that file.  The client was worried because these were important Excel, Word and PDF files which worked fine yesterday.  A second call followed the first almost before we could hang up the phone from another user reporting even more files that were no longer usable.  The problem of unusable files appeared to be spreading like wildfire across their network!

What was the cause?  It was a reasonably new Ransonware program called CryptoLocker and it's pretty devastating.  Here's what we know:

CryptoLocker arrives either an attachment to an e-mail or as a download from an infected web site.  In most reported instances it requires the user to click on the attachment or reply yes to a download prompt from the infected web site to deploy.

It will rapidly begin encrypting every MS Office (Word, Excel, PowerPoint etc) file, PDF file, audio files and graphic files it can see on the network.  The encryption is very high level and most technicians report little success in unencrypting the files.  In the instance we encountered today, all of the affected files and folders had their modified date time stamp set to the time of the infection.

In some instances, the program changes the PC desktop background to a red splash screen identifying itself.  It then displays a warning screen about the encryption and gives the user 72 hours to send $300 for the decryption key complete with a count-down clock to add emphasis to the fact there is a deadline to pay their ransom.

What do you do if you find yourself infected?

First and foremost, if you're on a network, immediately disconnect the PC from the network by logging off or removing your network cable (or disable your wireless card) to minimize the potential damage.

Here's how to remove CryptoLocker:

Restart your computer in SAFE Mode.  Choose the “Safe Mode with Networking” option.


When Windows starts with the word SAFE in each corner of your desktop, launch Windows Task Manager by pressing keys Ctrl+Alt+Del, search for CRYPTOLOCKER processes and right-click to end them.

Open the Control Panel in the Start menu and search for Folder Options. When you’re in the Folder Options window, click on the View tab, check Show hidden files and folders and uncheck Hide protected operating system files and then press OK.

Click on the “Start” menu again and then click on the “Search programs and files” box, Search for and delete these files created by CryptoLocker:
  • %AllUsersProfile%\random.exe
  • %AppData%\Roaming\Microsoft\Windows\Templates\random.exe
  • %Temp%\random.exe
 
Open the Registry Editor by opening the RUN option in the Start Menu and typing REGEDIT in the Run box and click “OK” to proceed. When Registry Editor is open, search and get rid of the following registry entries:
 
 


HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\[RANDOM HARACTERS].exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Random
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” =Random
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run\Random.exe

You can then reboot the computer normally to check whether the virus is completely removed or not.  You'll know if it's gone if the CryptoLocker warning window doesn't return but we recommend running your anti-virus program update and a full scan as well as a running program like MalwareBytes as an additional precaution.  You should then be able to reconnect your PC to the server.
 
Be aware that your Desktop will probably still have the modified background but you can easily restore your desktop using the Display option in Control Panel. 
 
If there can be any good news about this ransonware, it's that it currently doesn't appear to be able to cross-propagate across the network from the infected PC so it's does seems to stay put at the initial point of infection.
 
The bad news is that it's very unlikely that you'll be able to recover or decrypt any files that this program encrypted.  Hopefully, you've kept a recent backup copy of all of your critical files and can restore those that were damaged.  If not, you're probably out of luck getting those files restored.
 
If you haven't protected your PC and server data yet, why not give ACT a call for a free 30 day trial of DataVault Files And Folders.  It's the easiest way to keep a secure backup for all of your critical business files.  You can arrange for your free trial by calling us at (847) 639-7000.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ▼  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ▼  September (2)
      • Beware Fake Microsoft Tech Support Calls
      • Fighting The Destructive Cryptolocker Ransomeware
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (2)
    • ►  November (8)
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile