Solved

CryptoLocker

Posted on 2014-03-04
5
385 Views
Last Modified: 2014-08-06
is anyone know some working solution that can prevent CryptoLocker to infect my network computer?
0
Comment
Question by:Robert-Prodigy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 10

Expert Comment

by:WayneATaylor
ID: 39903946
What we are doing to prevent it is to create a new local security policy or a GPO for an AD network domain that prevents any EXE's running from within %AppData%

This works because this is where Cryptolocker runs.

You might find you have to create whitelist entries to allow required programs to run, i.e. some installers/updaters etc but this does work well.  We've had no infections once doing this for customers.

Wayne
0
 

Author Comment

by:Robert-Prodigy
ID: 39904490
thx any chance to decode  infected machine? we have one machine that encrypt all the files - no shadow copy or backup for this machine - we excite some operation mention in article over the net currently with no luck - nothing work :( files still encrypt

also anyone ever pay for this guys?
0
 
LVL 10

Accepted Solution

by:
WayneATaylor earned 500 total points
ID: 39904616
No sorry, I think its basically impossible without the key!
0
 

Author Comment

by:Robert-Prodigy
ID: 39914857
is any one ever tried to decrypt with Kaspersky decrypt utility? is there any other tools that try to decrypt crypt locker encryption?
0
 
LVL 64

Expert Comment

by:btan
ID: 40243971
For info on - FireEye and Fox-IT have partnered to provide free keys designed to unlock systems infected by CryptoLocker.

https://www.decryptcryptolocker.com/
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question