Solved

cryptolocker infection

Posted on 2013-11-07
16
735 Views
Last Modified: 2013-12-02
one of my users opened an email attachment (voicemail) but was an application and got infected with cryptolocker. it has affected several shares and all of the files on the computer.

they are demanding $300.

i do have backups i can restore from. my question is how do i know the virus is only on this machine and hasn't infected the server where the file shares are? 2 of the 5 shares seem to be infected.

is it worth paying the $300?

btw still not sure how the infection got past the spam filter, fortinet firewall, and panda cloud antivirus.
0
Comment
Question by:datatechdc
  • 8
  • 7
16 Comments
 
LVL 26

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 500 total points
Comment Utility
If you have backups use them.  Whatever you do DO NOT use a credit card to pay for decrypting (if you go that route).  Your network shares have a good chance of being infected - if you can open files you are okay.  Make sure the infected machines are not on the network.

Check out these links for preventitive measures (I know it is a bit of closing the barn doors after the cow is gone, but...)

http://windowssecrets.com/top-story/cryptolocker-a-particularly-pernicious-virus/

This one purports to be a fix, although I have no first hand experience with it and have some doubts as to it's veracity (as do many of the commentors at the bottom of the article):

http://malwarefixes.com/remove-cryptolocker-virus/
0
 

Author Comment

by:datatechdc
Comment Utility
i have located the infected files. it only got to 2 out of the 5 shares and i located the email that it came from. the email disguised itself as a voicemail in a zip file. when you open it the file type is an exe and not an audio file.

how can i check to see if other machines on the network got infected?
0
 

Author Comment

by:datatechdc
Comment Utility
btw they want payment in the form of bitcoin. the question is if i wanted to pay the $300 and get the key just in case, how would i decrypt all of the data they infected. is there a utility or software or do you have to do it one at a time?
0
 
LVL 26

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 500 total points
Comment Utility
They supposedly give you the key and then you can unencrypt all files on a drive at once by using a standard decryptor and inputting the key they provide (see the supposed solution link - they are using a sophos decryptor that will request a decryption key.
0
 
LVL 26

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 500 total points
Comment Utility
Oh and if you have backups you won't need the decryption key - but just in case make another backup before the restore.
0
 

Author Comment

by:datatechdc
Comment Utility
im checking my backups now. absolutely ridiculous how they can do this.

what are the chances if you pay the money, they will actually provide the key?
0
 
LVL 26

Accepted Solution

by:
Thomas Zucker-Scharff earned 500 total points
Comment Utility
From the people I've spoken to the key has been provided.  Just don't give them any info that will allow them to steal $$ or your identity.  It is ridiculous, so if you can use backups all the better.
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 

Author Comment

by:datatechdc
Comment Utility
have you used bitcoin? seems to be a safe way to send money without compromising identity.
0
 
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Never used it.  I do use paypal and feel that is fairly safe.
0
 

Author Comment

by:datatechdc
Comment Utility
they only accept bitcoin or moneypak
0
 

Author Comment

by:datatechdc
Comment Utility
the panda utility doesnt work at all. even though i have a good version of the same files it still doesnt work.

looks like im fully depending on my backup.
0
 
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Sorry to hear.  Good luck.
0
 

Author Comment

by:datatechdc
Comment Utility
i obtained the key. what utility can i use to decrypt the files?
0
 
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
There are a number of tools.  Although I have no personal experience with it, Kaspersky recommends their own klwk utility (http://support.kaspersky.com/viruses/utility and http://support.kaspersky.com/55).
0
 

Author Comment

by:datatechdc
Comment Utility
i dont see how these utilities will allow me to use the encryption key i paid for to decrypt the files?
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now