?
Solved

cryptolocker infection

Posted on 2013-11-07
16
Medium Priority
?
758 Views
Last Modified: 2013-12-02
one of my users opened an email attachment (voicemail) but was an application and got infected with cryptolocker. it has affected several shares and all of the files on the computer.

they are demanding $300.

i do have backups i can restore from. my question is how do i know the virus is only on this machine and hasn't infected the server where the file shares are? 2 of the 5 shares seem to be infected.

is it worth paying the $300?

btw still not sure how the infection got past the spam filter, fortinet firewall, and panda cloud antivirus.
0
Comment
Question by:datatechdc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 8
  • 7
16 Comments
 
LVL 29

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 2000 total points
ID: 39630948
If you have backups use them.  Whatever you do DO NOT use a credit card to pay for decrypting (if you go that route).  Your network shares have a good chance of being infected - if you can open files you are okay.  Make sure the infected machines are not on the network.

Check out these links for preventitive measures (I know it is a bit of closing the barn doors after the cow is gone, but...)

http://windowssecrets.com/top-story/cryptolocker-a-particularly-pernicious-virus/

This one purports to be a fix, although I have no first hand experience with it and have some doubts as to it's veracity (as do many of the commentors at the bottom of the article):

http://malwarefixes.com/remove-cryptolocker-virus/
0
 

Author Comment

by:datatechdc
ID: 39630991
i have located the infected files. it only got to 2 out of the 5 shares and i located the email that it came from. the email disguised itself as a voicemail in a zip file. when you open it the file type is an exe and not an audio file.

how can i check to see if other machines on the network got infected?
0
 

Author Comment

by:datatechdc
ID: 39630993
btw they want payment in the form of bitcoin. the question is if i wanted to pay the $300 and get the key just in case, how would i decrypt all of the data they infected. is there a utility or software or do you have to do it one at a time?
0
Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

 
LVL 29

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 2000 total points
ID: 39631034
They supposedly give you the key and then you can unencrypt all files on a drive at once by using a standard decryptor and inputting the key they provide (see the supposed solution link - they are using a sophos decryptor that will request a decryption key.
0
 
LVL 29

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 2000 total points
ID: 39631041
Oh and if you have backups you won't need the decryption key - but just in case make another backup before the restore.
0
 

Author Comment

by:datatechdc
ID: 39631062
im checking my backups now. absolutely ridiculous how they can do this.

what are the chances if you pay the money, they will actually provide the key?
0
 
LVL 29

Accepted Solution

by:
Thomas Zucker-Scharff earned 2000 total points
ID: 39631087
From the people I've spoken to the key has been provided.  Just don't give them any info that will allow them to steal $$ or your identity.  It is ridiculous, so if you can use backups all the better.
0
 

Author Comment

by:datatechdc
ID: 39631100
have you used bitcoin? seems to be a safe way to send money without compromising identity.
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 39631124
Never used it.  I do use paypal and feel that is fairly safe.
0
 

Author Comment

by:datatechdc
ID: 39631134
they only accept bitcoin or moneypak
0
 

Author Comment

by:datatechdc
ID: 39631447
the panda utility doesnt work at all. even though i have a good version of the same files it still doesnt work.

looks like im fully depending on my backup.
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 39631495
Sorry to hear.  Good luck.
0
 

Author Comment

by:datatechdc
ID: 39637957
i obtained the key. what utility can i use to decrypt the files?
0
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 39638873
There are a number of tools.  Although I have no personal experience with it, Kaspersky recommends their own klwk utility (http://support.kaspersky.com/viruses/utility and http://support.kaspersky.com/55).
0
 

Author Comment

by:datatechdc
ID: 39639851
i dont see how these utilities will allow me to use the encryption key i paid for to decrypt the files?
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are many reasons malware will stay around and continue to grow as a business.  The biggest reason is the expanding customer base.  More than 40% of people who are infected with ransomware, pay the ransom.  That makes ransomware a multi-million…
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question