File-trashing Cryptolocker PC malware

Yes, really nasty this one. A gent I know was hit by this and his backups were found wanting so he was forced to pay up.
 
rofl yeah,

this is one of the worst things going around at the moment, I know of someone who was stupid enough to open an email attachment containing an exe disguised as a .pdf, it encrypted their entire network share and the company had to pay $300..
 
rofl yeah,

this is one of the worst things going around at the moment, I know of someone who was stupid enough to open an email attachment containing an exe disguised as a .pdf, it encrypted their entire network share and the company had to pay $300..

You knew someone working for a departmentalised company who was 'stupid' enough to open a pdf they were sent on their work email within the companies email system?

There isn't much stupid going on there, I'd say 95% of users would do that, and the other 5% were too lazy to get round to it yet.
 
You knew someone working for a departmentalised company who was 'stupid' enough to open a pdf they were sent on their work email within the companies email system?

There isn't much stupid going on there, I'd say 95% of users would do that, and the other 5% were too lazy to get round to it yet.

Opening any attachment from someone you don't recognize, or are expecting is stupid, no excuses.
 
It's the companys fault for not having backups they could restore from.

Cryptolocker should hopefully shock those of you who don't backup your files into doing something. Cryptolocker can hit any files that your user account has permission to write to - so a Windows 8 File History on a NAS or an external drive, or a Shadow Copy isn't enough to ensure you can get your stuff back without paying the ransom (although if you are hit the general consensus seems to be that paying the ransom does decrypt your stuff, I'm sure we could all do without the $300 bill). Having your data on a RAID1 array is also not a backup.

You need backup that is removed from your PC - so either an external drive that you back up to once a day and then disconnect, or an online backup system that keeps previous versions of files so you can restore even if some of the encrypted files get backed up. There are loads of providers that offer this and it's normally no more than $5 a month.

And if you're acting a bit smug because you have backups in place, now is the time to do a test restore to make sure you have all the encryption keys or passwords that you need to get your data back.
 
Last edited:
And for those of you looking after Windows networks, please use Group Policy to turn off the stupid default of hiding file extensions.
 
One of my company's clients got it and not only did the thing encrypt the local computer, but was found working through the network shares and ultimately encrypted their entire shared drive... Backup restored as nothing could be done.
 
Really nasty piece of work this one, we've had a few customers get it that required their data so had to pay it to get the data back.
 
AV can make things worse. If you 'clean' the virus whilst your files are still encrypted then there is no chance of getting your stuff back since it deletes any reference to what private key is needed to decrypt your files.
 
As dodgy/nasty as it is, I have to say, it's pretty impressive :eek:

Is a dodgy link the main (only?) way that computers are getting infected?
 
As dodgy/nasty as it is, I have to say, it's pretty impressive :eek:

Is a dodgy link the main (only?) way that computers are getting infected?

You could potentially be part of collateral damage, eg. it can spread through locally networked devices.
 
AV can make things worse. If you 'clean' the virus whilst your files are still encrypted then there is no chance of getting your stuff back since it deletes any reference to what private key is needed to decrypt your files.

Any decent AV should be catching this on the original inbound email long before it's had a chance to encrypt anything
 
Back
Top Bottom