CryptoLocker

Discussion in 'malware problems & news' started by DX2, Sep 10, 2013.

  1. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,784
  2. bo elam

    bo elam Registered Member

    Joined:
    Jun 15, 2010
    Posts:
    6,147
    Location:
    Nicaragua
  3. G1111

    G1111 Registered Member

    Joined:
    May 11, 2005
    Posts:
    2,294
    Location:
    USA
    Thanks for responses GZ, LW and b e.
     
  4. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    Im just trying out Sandboxie for the first time right now. Adding another layer of protection against this diabolical virus, is great news.
     
  5. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Sure it's scary post-infection, but aren't too many people overestimating how well it spreads?
     
  6. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    why are you saying this?
     
  7. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
  8. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Don't see anything special on how the computer becomes infected, or did I miss something?
     
  9. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Oh man, talk about taking malware to another level. :ouch:

    If nothing else comes of this newest twist in public extortion, it should without doubt encourage it's victims to finally establish a preventive backup plan for the future.

    Just when you think you seen it all...

    :blink:
     
  10. guest

    guest Guest

    EXE Radar:
    Only have a brief trial with this. Didn't manage to try the whole thing because the custom whitelist bug made me lose my interest. It seems to be fixed a few months ago.

    AppGuard:
    A brief trial as well, but I got my hands on it... well, sort of. If you guarded the browser and enabled the "privacy mode" with your personal folders are in the... uhm, protected area rules and set the access to "deny access" or "read-only", then it should prevent it if the malware enters by exploiting the browser.

    Of course, the obvious thing to do first is to prevent CryptoLocker or any other malware to be installed/executed. Then protect the trusted processes from being hijacked/manipulated. Then block unauthorized access to your personal files and folders.

    Oh BTW, found how to restrict access in Sandboxie:
    https://www.wilderssecurity.com/showpost.php?p=1923325&postcount=5
     
  11. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    Clicking on links in emails (one way we are infected) is pretty much the same old same old ... I don't think it needs to be "special" to have a big reach, but I wonder what the actual figures are? From what Ive heard its pretty much hitting world wide. I think it would be safe to say its causing a lot of people a lot of grief. Sure is a scumbag.

    Thanks for that Graf, Im just learning Sandboxie now.
     
  12. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
  13. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
    Watch CryptoLocker in action:

    -http://www.youtube.com/watch?v=Gz2kmmsMpMI-
     
  14. Dragon1952

    Dragon1952 Registered Member

    Joined:
    Sep 16, 2012
    Posts:
    2,470
    Location:
    Hollow Earth - Telos
    Last edited: Nov 5, 2013
  15. zerotox

    zerotox Registered Member

    Joined:
    Jul 16, 2009
    Posts:
    419
    I have a question - instead of using CryptoPrevent Tool, or manually adding the rules in SRP, wouldn't it be enough to just change the policy to "disallowed", which makes it default-deny any execution from user-area folders or temp folders?
     
  16. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
  17. guest

    guest Guest

    @Reality

    Don't thank to me, thank to Bo. It's his post, I just dug the older threads. Backup first before playing with it just in case.

    @erikloman

    That's nice to know. :thumb:
     
  18. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    OK graf one little word missing... thx for the link. :) Hopefully that's better?

    So since we are told to backup backup backup (with cryptolocker this advice has never been so important) has anyone got any recos on a good freebie backup ut?

    Agreed...its a pretty rotten deal this one. :( What next?
     
  19. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
    I guess you've answered your own question ? Immunity On | Off ? Your AV solution should be blacklisting most of this at this juncture. The AV supplied solutions are their own and I cannot attest if they are viable solutions. Safe Hex prevails at all times.

     
  20. Dragon1952

    Dragon1952 Registered Member

    Joined:
    Sep 16, 2012
    Posts:
    2,470
    Location:
    Hollow Earth - Telos
    Re: HitmanPro.Alert with CryptoGuard

    No way to tell if i should go with CG or BD Anti-CryptorLocker. I have BDACL running now but AppGuard won't let it start with Windows..so i have to start it after boot. Maybe AG will let it start with Windows. I will find out in 12 hours . Can CG and BDACL both run together without any problems? I have them both running now but don't know what would happen when they had CLocker to deal with.
     
    Last edited: Nov 6, 2013
  21. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
    Less acronym jargon for those looking in, might help those less inclined, learn more.

    According to some sources: CryptoLocker is now the most prolific malware threat.
     
  22. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545
    I was just about to say this myself... the best way to prevent it is to create SRP rules for AppData & UserProfile. Or if you're like me and have a default deny SRP in place already, this can't touch you.

    Stop it from getting there in the first place instead of trying to shoot it down later. That's how you have to roll these days.
     
  23. TomAZ

    TomAZ Registered Member

    Joined:
    Feb 27, 2010
    Posts:
    1,131
    Location:
    USA
    What are the steps for accomplishing this with Win XP?
     
  24. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    As Luciddream alluded to with the default deny approach, it is the best way to set up SRP rules. For the most part avoid using "Deny" rules (although there can be certain cases to use them, especially for blocking executables on removable media), and stick with "Allow" rules only, especially concerning the unprotected user directories, where you may want to create more granular rules. Think of the whitelist as a guest list for a private function, where only those on the list are allowed in. If not on the list, you're denied access.

    Even stronger than Path rules are Hash rules, but of course those require a lot of ongoing maintenance to update the hash values when whitelisted files are updated.

    BTW, I see nothing about CryptoLocker that makes it any more special nor any more difficult to prevent than other mainstream malware, other than how it infects with its encryption method, otherwise it's attack vector is really no different than those rogue AV malware and such. It seems to be getting a lot of undeserved hype.
     

    Attached Files:

  25. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    What's sad is that most write-ups, other than warning about opening email attachments, don't stress the types of protection that many have listed here. These would protect in case of an accident, where someone was fooled by the enticement to open an attachment. If the OS was configured not to show extensions ("Hide extensions for known file types"), then the double extension trick could be effected, where the .exe extension wouldn't display and a fake extension (.pdf in many of the samples) would display:

    http://www.ghacks.net/2013/10/24/prevent-cryptolocker-ransomware-hit-pc/
    For those who haven't seen this trick before:

    Hide Extensions checked:
    extension_1.jpg

    All Extensions display:
    extension_2.jpg

    As krebsonsecurity.com and others have noted, the executable payload also can arrive via booby-trapped web sites exploiting vulnerable browser plug-ins.

    In both cases, with protection enabled that many have described, this exploit fails.

    I notice that some organizations filter .exe files. From Northeastern University:

    http://www.northeastern.edu/securenu/?p=2823
    I also notice that analyses are not consistent in describing the malware. Some call it a virus, some a trojan. Technically, it appears to be a trojan.

    Aryeh Goretsky of eset writes:

    https://forum.eset.com/topic/1210-just-hit-by-cryptolocker/#entry6969
    And from nakedsecurity:

    http://nakedsecurity.sophos.com/201...-learn-about-prevention-cleanup-and-recovery/
    Of course, to the victim, it doesn't matter what you call it!


    ----
    rich
     
    Last edited: Nov 6, 2013
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.