[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

CryptoLocker

Posted on 2014-03-04
5
Medium Priority
?
396 Views
Last Modified: 2014-08-06
is anyone know some working solution that can prevent CryptoLocker to infect my network computer?
0
Comment
Question by:Robert-Prodigy
  • 2
  • 2
5 Comments
 
LVL 10

Expert Comment

by:WayneATaylor
ID: 39903946
What we are doing to prevent it is to create a new local security policy or a GPO for an AD network domain that prevents any EXE's running from within %AppData%

This works because this is where Cryptolocker runs.

You might find you have to create whitelist entries to allow required programs to run, i.e. some installers/updaters etc but this does work well.  We've had no infections once doing this for customers.

Wayne
0
 

Author Comment

by:Robert-Prodigy
ID: 39904490
thx any chance to decode  infected machine? we have one machine that encrypt all the files - no shadow copy or backup for this machine - we excite some operation mention in article over the net currently with no luck - nothing work :( files still encrypt

also anyone ever pay for this guys?
0
 
LVL 10

Accepted Solution

by:
WayneATaylor earned 1000 total points
ID: 39904616
No sorry, I think its basically impossible without the key!
0
 

Author Comment

by:Robert-Prodigy
ID: 39914857
is any one ever tried to decrypt with Kaspersky decrypt utility? is there any other tools that try to decrypt crypt locker encryption?
0
 
LVL 65

Expert Comment

by:btan
ID: 40243971
For info on - FireEye and Fox-IT have partnered to provide free keys designed to unlock systems infected by CryptoLocker.

https://www.decryptcryptolocker.com/
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain how to manually move a SEP client to a different client group by performing steps on the client-side. These steps may prove particularly useful because they allow the client to move after it has alrea…
UPDATE - 6/15/2011 Added support for Release Update 6 Maintenance Patch 2 Point Patch 1 (RU6 MP2 PP1). Fixed a defect in the username field that was hard-coded to look for a specific domain (left over code from testing). This release will be the …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question