Solved

CryptoLocker

Posted on 2014-03-04
5
379 Views
Last Modified: 2014-08-06
is anyone know some working solution that can prevent CryptoLocker to infect my network computer?
0
Comment
Question by:Robert-Prodigy
  • 2
  • 2
5 Comments
 
LVL 10

Expert Comment

by:WayneATaylor
ID: 39903946
What we are doing to prevent it is to create a new local security policy or a GPO for an AD network domain that prevents any EXE's running from within %AppData%

This works because this is where Cryptolocker runs.

You might find you have to create whitelist entries to allow required programs to run, i.e. some installers/updaters etc but this does work well.  We've had no infections once doing this for customers.

Wayne
0
 

Author Comment

by:Robert-Prodigy
ID: 39904490
thx any chance to decode  infected machine? we have one machine that encrypt all the files - no shadow copy or backup for this machine - we excite some operation mention in article over the net currently with no luck - nothing work :( files still encrypt

also anyone ever pay for this guys?
0
 
LVL 10

Accepted Solution

by:
WayneATaylor earned 500 total points
ID: 39904616
No sorry, I think its basically impossible without the key!
0
 

Author Comment

by:Robert-Prodigy
ID: 39914857
is any one ever tried to decrypt with Kaspersky decrypt utility? is there any other tools that try to decrypt crypt locker encryption?
0
 
LVL 61

Expert Comment

by:btan
ID: 40243971
For info on - FireEye and Fox-IT have partnered to provide free keys designed to unlock systems infected by CryptoLocker.

https://www.decryptcryptolocker.com/
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are many HijackThis tutorials on the web already, so this article is about tips that help utilize HijackThis' full potential as a diagnostic tool. Download HijackThis from a TrendMicro link or from known reliable sources only. http://free.…
The purpose of this Article is to provide information for a newly released variant of malware – with the assumption that many EE Members will have need of the information. According to “Computerworld”, well over one million web sites have been co…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.
Need to grow your business through quality cloud solutions? With everything required to build a cloud platform and solution, you may feel like the distance between you and the cloud is quite long. Help is here. Spend some time learning about the Con…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now