?
Solved

CryptoLocker Virus

Posted on 2013-11-12
4
Medium Priority
?
502 Views
Last Modified: 2013-12-07
There are some great tools available to help fight .exe's using group policy, according to ThirdTier (thank you) I followed their writeup which .exe's to block in GP to prevent CryptoLocker from taking over data, which are:

Path: %AppData%\*.exe
Path: %AppData%\*\*.exe
Path: %Temp%\Rar*\*.exe
Path: %Temp%\7z*\*.exe
Path: %Temp%\wz*\*.exe
Path: %Temp%\*.zip\*.exe

My question, I have allot of users using 3rd party apps, what is the best way to allow certain .exe's from executing without running risk of CryptoLocker or other .exe's that are hazardous.
0
Comment
Question by:WORKS2011
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 59

Accepted Solution

by:
Cliff Galiher earned 1400 total points
ID: 39642586
If you read all the stuff that comes with the Third Tier paper, the idea there is that it blocks all all executables in certain locations. Locations where executables wouldn't normally run anyways, such as from places where mail clients save attachments or web browsers store info.

Legitimate 3rd party programs usually install into the "program files" directory and in ciata/win7/win8, standard users don't have write access to this folder, so it is much more do it is to get socially engineered into launching fake code.

If you follow the third tier guidance, including not letting every user be an administrator, legit programs will work fine because they will exist in a path not listed above. This just blocks the "suspicious" locations where code would never normally run from.
0
 
LVL 14

Assisted Solution

by:Ram Balachandran
Ram Balachandran earned 400 total points
ID: 39642612
You can restrict access to application from execution using Software Restriction Policies
You select a path and deny access or select an application and much more

Have a look  - http://technet.microsoft.com/en-us/magazine/2008.06.srp.aspx
0
 
LVL 56

Assisted Solution

by:McKnife
McKnife earned 200 total points
ID: 39642825
+1 for cgaliher. In addition: applocker offers logging. When blocking, it produces certain events in its own log. Since we can attach tasks to events (even deploy those tasks using group policy preferences), you can setup mails whenever anything is blocked. Not only interesting for cryptolocker awareness but more for applocker false-positives.
0
 
LVL 17

Author Comment

by:WORKS2011
ID: 39643353
Thank you for the great feedback, love EE!!! Specifically Spotify (yeah I know it's not business but I like to keep my clients happy) won't launch on several computers. I don't believe it installs itself in the Program Files folder rather it launches each time connects to the internet then closes out (uninstalls) after closing.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question