?
Solved

CryptoLocker

Posted on 2014-03-04
5
Medium Priority
?
386 Views
Last Modified: 2014-08-06
is anyone know some working solution that can prevent CryptoLocker to infect my network computer?
0
Comment
Question by:Robert-Prodigy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 10

Expert Comment

by:WayneATaylor
ID: 39903946
What we are doing to prevent it is to create a new local security policy or a GPO for an AD network domain that prevents any EXE's running from within %AppData%

This works because this is where Cryptolocker runs.

You might find you have to create whitelist entries to allow required programs to run, i.e. some installers/updaters etc but this does work well.  We've had no infections once doing this for customers.

Wayne
0
 

Author Comment

by:Robert-Prodigy
ID: 39904490
thx any chance to decode  infected machine? we have one machine that encrypt all the files - no shadow copy or backup for this machine - we excite some operation mention in article over the net currently with no luck - nothing work :( files still encrypt

also anyone ever pay for this guys?
0
 
LVL 10

Accepted Solution

by:
WayneATaylor earned 1000 total points
ID: 39904616
No sorry, I think its basically impossible without the key!
0
 

Author Comment

by:Robert-Prodigy
ID: 39914857
is any one ever tried to decrypt with Kaspersky decrypt utility? is there any other tools that try to decrypt crypt locker encryption?
0
 
LVL 64

Expert Comment

by:btan
ID: 40243971
For info on - FireEye and Fox-IT have partnered to provide free keys designed to unlock systems infected by CryptoLocker.

https://www.decryptcryptolocker.com/
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question