• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 458
  • Last Modified:

Ransom Ware

Hi I have a real-estate company  that has just had a ransom ware attack
this file on shared folders on the server

"All files including videos, photos and documents on your computer are encrypted.

In order to decrypt the files, open site 4sfxctgp53imlvzk.onion"

I can access files using previous versions without issue (lucky) sbs2011
question there running AVG Business on the server & workstation
is this program likely running on a PC that's doing this (how to locate?)

I'm hoping not to have to reload the server , but may have reload all workstations
or could I get away with a system restore?
0
Logical_Step
Asked:
Logical_Step
  • 5
  • 3
1 Solution
 
cpmcomputersCommented:
0
 
Logical_StepAuthor Commented:
Thanks
It look similar
will check all PC's tomorrow morning
0
 
cpmcomputersCommented:
Beware that the later versions can disable your shadow copies
This will leave you no way but to restore from backup or pay the ransom ( not guarantee or recommended)

Depending on your file sizes it may be useful to "restore from previous versions" using you shadowcopies  all critical data now to an alternative location Then take it offline
this should give you a safety backup if all else fails

I dealt with a case of this on two occasions
The entry point was a user opening an innocent looking .zip file  in an email attachment
So the infection will probably be on a workstation not the server itself

Good luck
keep us posted
0
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

 
Logical_StepAuthor Commented:
After disconnecting all PC from the Network
managed to recover all files from a few days earlier with previous versions off the server
I couldn't find any with Cryptolocker files on any PC's
in apps local or registry run
I did a system restore on all in case due to time issues (unplugged didn't loose trust)
All running fine for last couple of days

PS Couldn't find any email attachments either in the time period
0
 
cpmcomputersCommented:
I would now scan all the pc ' s and servers with malwarebytes as a check and prevent reinfection (you can get the free version from the bleeping computers site)

Is it possible a pc or perhaps a laptop user (not presently on the network) has been missed?
0
 
cpmcomputersCommented:
I was just looking at the encryption message
Check out
http://botcrawl.com/remove-cryptorbit-virus/with malwarebytes
 
Looks like you might be lucky and have this rather than cyryptolocker itself

Is it possible a pc or perhaps a laptop user (not presently on the network) has been missed?
0
 
cpmcomputersCommented:
0
 
Logical_StepAuthor Commented:
That link didn't work but this does

http://www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware-information
& yes this look like it , all PC's were scanned with Malware Bytes  All Clean

Will keep checking
Thanks for your help
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

  • 5
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now