Beware: CryptoLocker Virus

Looks to be another nasty one.

A new computer virus is being called one of the strongest and most devastating viruses in history, strikes by literally holding the computer owners hostage, the Inquisitr reported.

The CryptoLocker Virus - which not only has the potential to destroy a computer hard drive, but holds the computer owners data ransom -infects computers through a legitimate-looking email, usually from a reputable company like FedEx or UPS. Once opened, the virus quickly spreads to the computer's hard drive and then offers the user a chance to rid the program for a hefty fee.

Crypto Locker Virus: New Aggressive Computer Virus Demands Ransom : News : University Herald
 
Looks to be another nasty one.

A new computer virus is being called one of the strongest and most devastating viruses in history, strikes by literally holding the computer owners hostage, the Inquisitr reported.

The CryptoLocker Virus - which not only has the potential to destroy a computer hard drive, but holds the computer owners data ransom -infects computers through a legitimate-looking email, usually from a reputable company like FedEx or UPS. Once opened, the virus quickly spreads to the computer's hard drive and then offers the user a chance to rid the program for a hefty fee.

Crypto Locker Virus: New Aggressive Computer Virus Demands Ransom : News : University Herald

HA! Now THAT is the way to design a Virus. Not just to be destructive, like Sirefef, but to literally hold your data hostage for a PRICE.

This is a step beyond the regular destructive tactics used. But I doubt if PAYING these guys will actually rid your system of it.

I'll have to see if a fix for this has been thought up, it would have to run from an external disk.
 

My Computer

System One

  • OS
    Windows 8 Pro with Media Center/Windows 7
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Asus M2N-MX SE Plus § DualCore AMD Athlon 64 X2, 2300 MHz (11.5 x 200) 4400+ § Corsair Value Select
    CPU
    AMD 4400+/4200+
    Motherboard
    Asus M2N-MX SE Plus/Asus A8M2N-LA (NodusM)
    Memory
    2 GB/3GB
    Graphics Card(s)
    GeForce 8400 GS/GeForce 210
    Sound Card
    nVIDIA GT218 - High Definition Audio Controller
    Monitor(s) Displays
    Hitachi 40" LCD HDTV
    Screen Resolution
    "1842 x 1036"
    Hard Drives
    WDC WD50 00AAKS-007AA SCSI Disk Device
    ST1000DL 002-9TT153 SCSI Disk Device
    WDC WD3200AAJB-00J3A0 ATA Device
    WDC WD32 WD-WCAPZ2942630 USB Device
    WD My Book 1140 USB Device
    PSU
    Works 550w
    Case
    MSI "M-Box"
    Cooling
    Water Cooled
    Keyboard
    Dell Keyboard
    Mouse
    Microsoft Intellimouse
    Internet Speed
    Cable Medium Speed
    Browser
    Chrome/IE 10
    Antivirus
    Eset NOD32 6.x/Win Defend
    Other Info
    Recently lost my Windows 8 on my main PC, had to go back to Windows 7.
This is a step beyond the regular destructive tactics used. But I doubt if PAYING these guys will actually rid your system of it.

Au contraire! Assuming they can collect the money, it's in their interest to provide good service.
 

My Computer

System One

  • OS
    Windows 8.1 Pro with Media Center
My understanding is that Cryptolocker is designed to run from %AppData% and blocking all executablesshould prevent it from running. The suggestion (Link) is to use gpedit and add:

Local Computer Policy > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules and add the following:

Path: %AppData%\*.exe
Security Level: Disallowed

Path: %AppData%\*\*.exe
Security Level: Disallowed

The problem I ran into is that in Windows 8; maybe others; %AppData%\*.exe does not block executables from running in that folder; I had to use %UserProfile%\*.exe. Would someone please enlighten me on what is correct? thanks....
 

My Computer

System One

  • OS
    Windows 8 Pro
    System Manufacturer/Model
    Dell Inspiron 1750
    CPU
    Duo Core 2.5 G HZ
This is a step beyond the regular destructive tactics used. But I doubt if PAYING these guys will actually rid your system of it.

Au contraire! Assuming they can collect the money, it's in their interest to provide good service.


They may reverse their encryption of your data, but how can you be sure they don't still have a hook into your system? The thing could reappear in a month or a year and demand money all over again. The only way out would be to copy and scrub your data to a backup and restore your system from scratch. Carefully.
 

My Computer

System One

  • OS
    Windows 8.1 consumer 64 bit
    Computer type
    Laptop
    System Manufacturer/Model
    Acer Aspire M5 481PT-6644
    CPU
    Intel Core I5
    Memory
    6 GB
    Hard Drives
    Spinning/SSD hybrid 500GB/20GB
    Mouse
    ELAN Trackpad
    Internet Speed
    18mbs/5mbs
    Browser
    Chrome
    Antivirus
    Windows Defender
What I don't understand is that MS created the encryption that is being used and MS can't block it - give me a break!!!!!
 

My Computer

System One

  • OS
    Windows 8 Pro
    System Manufacturer/Model
    Dell Inspiron 1750
    CPU
    Duo Core 2.5 G HZ
What I don't understand is that MS created the encryption that is being used and MS can't block it - give me a break!!!!!


Heh...;) that's only because you don't understand what encryption is, evidently...;)

At any rate, I just read two articles in the Microsoft database that state that Malware definitions against Crypto Locker have been resident in both MSE (XP & Vista & W7) and MSE Defender in Win8/8.1 since October. I feel somewhat mollified.
 

My Computer

System One

  • OS
    UEFI install of Win8.1 x64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    self-crafted
    CPU
    FX-6300 @4.515Ghz
    Motherboard
    MSI 970a-G46
    Memory
    8 GB DDR3 (2x4) 1600 @ 1800
    Graphics Card(s)
    2GB HD 7850 @1.05GHz core/6GB/s ram
    Sound Card
    RealTek 892
    Monitor(s) Displays
    HannsG HZ281
    Screen Resolution
    1920x1200
    Hard Drives
    Seagate 320GB sata2 boot UEFI install of 8.1 x64;
    1TB WD Blue SATA 3;
    Seagate 2x 500GB sata2's in RAID 0
    PSU
    Corsair GS600
    Case
    LIan Li
    Cooling
    stock
    Keyboard
    Logitech Internet k-board
    Mouse
    Microsoft Sidewinder
    Internet Speed
    VDSL
    Browser
    Firefox
    Antivirus
    built into OS MSE/Defender
    Other Info
    Had a brain amputation followed up by an all-lobe "clean-up" lobotomy last year, am doing fine. Life is so much simpler, now.
What I don't understand is that MS created the encryption that is being used and MS can't block it - give me a break!!!!!


Heh...;) that's only because you don't understand what encryption is, evidently...;)

At any rate, I just read two articles in the Microsoft database that state that Malware definitions against Crypto Locker have been resident in both MSE (XP & Vista & W7) and MSE Defender in Win8/8.1 since October. I feel somewhat mollified.

I know what encryption is and your "mollified" statement says the whole thing - it is embedded in MS's OS and Crypto Locker simply picked up on it. There is no way that a hacker can be kept out of anything if they want in and spend enough time; ask Target. I will lay you odds that ObamaCare website is under attack now and will not be known until several million ID's have been stolen.

The major problem is companies keep trying to write code to protect and hackers use it against them.
 

My Computer

System One

  • OS
    Windows 8 Pro
    System Manufacturer/Model
    Dell Inspiron 1750
    CPU
    Duo Core 2.5 G HZ
Whoever finds the answer becomes a billionaire!
 

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    HP Pavillion p6230f
    CPU
    HP AMD Phenom II X4 810
    Motherboard
    FOXCONN ALOE
    Memory
    8 GBytes
    Graphics Card(s)
    ATI/AMD Radeon HD 42
    Sound Card
    ATI/AMD SB600 - High
    Monitor(s) Displays
    Dell SE198WFP
    Screen Resolution
    1440 x 900
    Hard Drives
    Seagate ST3750528AS
    Browser
    IE 11
    Antivirus
    Windows Defender
What I don't understand is that MS created the encryption that is being used and MS can't block it - give me a break!!!!!


Heh...;) that's only because you don't understand what encryption is, evidently...;)

At any rate, I just read two articles in the Microsoft database that state that Malware definitions against Crypto Locker have been resident in both MSE (XP & Vista & W7) and MSE Defender in Win8/8.1 since October. I feel somewhat mollified.

I know what encryption is and your "mollified" statement says the whole thing - it is embedded in MS's OS and Crypto Locker simply picked up on it. There is no way that a hacker can be kept out of anything if they want in and spend enough time; ask Target. I will lay you odds that ObamaCare website is under attack now and will not be known until several million ID's have been stolen.

The major problem is companies keep trying to write code to protect and hackers use it against them.

My point is that if you knew what encryption was you'd understand that, once used, it's deliberately designed to be impossible to crack without a key. Hackers are absolutely the smallest population using encryption these days--anyone can use it to protect his data. It makes as much sense to blame Microsoft for hackers as it does to blame architects for bank robberies...;) The fault is in the criminal, I'm sure you would agree. The problem is hackers, period. If not for hackers, companies would not have to write defensive code at all. In the beginning, back in the DOS/Win3.1 days, there was very little if any defensive code written--it was all 100% functional. The virus creators had a field day! Windows today is an order of magnitude more difficult to hack than it was then. Honestly, I'm not sure what your point is...;)
 

My Computer

System One

  • OS
    UEFI install of Win8.1 x64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    self-crafted
    CPU
    FX-6300 @4.515Ghz
    Motherboard
    MSI 970a-G46
    Memory
    8 GB DDR3 (2x4) 1600 @ 1800
    Graphics Card(s)
    2GB HD 7850 @1.05GHz core/6GB/s ram
    Sound Card
    RealTek 892
    Monitor(s) Displays
    HannsG HZ281
    Screen Resolution
    1920x1200
    Hard Drives
    Seagate 320GB sata2 boot UEFI install of 8.1 x64;
    1TB WD Blue SATA 3;
    Seagate 2x 500GB sata2's in RAID 0
    PSU
    Corsair GS600
    Case
    LIan Li
    Cooling
    stock
    Keyboard
    Logitech Internet k-board
    Mouse
    Microsoft Sidewinder
    Internet Speed
    VDSL
    Browser
    Firefox
    Antivirus
    built into OS MSE/Defender
    Other Info
    Had a brain amputation followed up by an all-lobe "clean-up" lobotomy last year, am doing fine. Life is so much simpler, now.
Leaving out the quotes:

How is code breaking done? The military has the ability to break any code that can be contrived via their super computers and they have proven it. MS has to know the length of the key, and by knowing that, they have the initiating force to break the encryption. If every virus sent out has a different key, (in this case 2 keys per infection) they need to put a little more effort into it. If this was a case of a national security problem by terrorists, there would be not stopping the effort to get rid of the virus.

To stop the use of this encryption, they need to reorganize the operating system in some manner that the new encryption cannot enter the system. My point is, the problem was created, fix it; we pay money for this stuff and reap the problems that they create.
 

My Computer

System One

  • OS
    Windows 8 Pro
    System Manufacturer/Model
    Dell Inspiron 1750
    CPU
    Duo Core 2.5 G HZ
Leaving out the quotes:

How is code breaking done? The military has the ability to break any code that can be contrived via their super computers and they have proven it. MS has to know the length of the key, and by knowing that, they have the initiating force to break the encryption. If every virus sent out has a different key, (in this case 2 keys per infection) they need to put a little more effort into it. If this was a case of a national security problem by terrorists, there would be not stopping the effort to get rid of the virus.

To stop the use of this encryption, they need to reorganize the operating system in some manner that the new encryption cannot enter the system. My point is, the problem was created, fix it; we pay money for this stuff and reap the problems that they create.

Hi there
there are only TWO ways to ensure your encryption cannot be broken one LOW tech solution and the second relies on hardware that is still largely in the theoretical stage.

The LOW tech way to do it is to use a ONE TIME PAD ( note to younger readers - this is does not mean a used iPAD !!).

One-time pad - Wikipedia, the free encyclopedia

The other way that will render encryption largely irrelevant is via the use of Quantum computers -- these process ALL STATES simultaneously so no matter what the complexity of the code a quantum computer using brute force would crack it easily -- note ALL combinations are processed "in one go" unlike a "classical computer" that would have to try combinations essentially sequentially.

Rendering encryption useless will cause a huge adjustment in Human social interaction since almost nothing could be hidden - with the exception of the one time pads.

It's actually quite amazing how in loads of situations relatively low tech can defeat the billons of dollars spent by governments and corporations around the world on espionage and surveillance equipment and methodology. !!!

Happy new year anyone

Cheers
jimbo
 

My Computer

System One

  • OS
    Linux Centos 7, W8.1, W7, W2K3 Server W10
    Computer type
    PC/Desktop
    Monitor(s) Displays
    1 X LG 40 inch TV
    Hard Drives
    SSD's * 3 (Samsung 840 series) 250 GB
    2 X 3 TB sata
    5 X 1 TB sata
    Internet Speed
    0.12 GB/s (120Mb/s)
Leaving out the quotes:

Hi there
there are only TWO ways to ensure your encryption cannot be broken one LOW tech solution and the second relies on hardware that is still largely in the theoretical stage.

The LOW tech way to do it is to use a ONE TIME PAD ( note to younger readers - this is does not mean a used iPAD !!).

One-time pad - Wikipedia, the free encyclopedia

The other way that will render encryption largely irrelevant is via the use of Quantum computers -- these process ALL STATES simultaneously so no matter what the complexity of the code a quantum computer using brute force would crack it easily -- note ALL combinations are processed "in one go" unlike a "classical computer" that would have to try combinations essentially sequentially.

Rendering encryption useless will cause a huge adjustment in Human social interaction since almost nothing could be hidden - with the exception of the one time pads.

It's actually quite amazing how in loads of situations relatively low tech can defeat the billons of dollars spent by governments and corporations around the world on espionage and surveillance equipment and methodology. !!!

Happy new year anyone

Cheers
jimbo

Interesting article. The point I was trying to make is that the code being used in this virus is known and should be breakable. I am sure that the length of the keys are long and would take a lot of iterations to make it happen.

If the hackers are producing random keys at the destination, then it would be useless to break any single instance because no two would be of the same variety. According to the hackers, they can restore the files, so they must have a "standard" key feeding the second key since it would be virtually impossible to have a key for every infected PC since they don't know which ones are infected. Oh come on, I know a hacker wouldn't lie and just take your money...
 

My Computer

System One

  • OS
    Windows 8 Pro
    System Manufacturer/Model
    Dell Inspiron 1750
    CPU
    Duo Core 2.5 G HZ
I have installed CryptoPrevent and HitmanPro Alert, both which indicate they STOP CryptoLocker. Some members at Wilder's Security Forum seems to think they can. Would like to get feedback from this forum.

I found info which seems to indicate they may or may not be effective.

Neither product can offer you 100% protection from all variants of Cryptolocker since malware will change to avoid detection methods.
CryptoLocker requires Admin rights in order to be successful, so running your system on a Limited User account will probably offer better protection than what any security product can offer.

I also backup my entire system weekly or more often to an external disk with Macrium Reflect - this is my "just in case" action.
 
Last edited:

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    HP Pavillion p6230f
    CPU
    HP AMD Phenom II X4 810
    Motherboard
    FOXCONN ALOE
    Memory
    8 GBytes
    Graphics Card(s)
    ATI/AMD Radeon HD 42
    Sound Card
    ATI/AMD SB600 - High
    Monitor(s) Displays
    Dell SE198WFP
    Screen Resolution
    1440 x 900
    Hard Drives
    Seagate ST3750528AS
    Browser
    IE 11
    Antivirus
    Windows Defender
Cryptolocker infects cop PC: Massachusetts plod fork out Bitcoin ransom ? The Register
This needs to be posted. This article I was reading a month ago was about a cop in Massachusetts who got infected with the cryptolocker virus and not even the FBI could decrypt the drive and so they had to pay the ransom of two Bitcoins (at the time of the article that was like 2,000+ US dollars).

I have to say, this is utterly brilliant in terms of ransomware. I'm surprised no one thought of doing this many years ago.

Having said that, it is quite scary as even the FBI couldn't undo the encryption in time.
 

My Computer

System One

  • OS
    Windows 8.1 Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    ASUS
    CPU
    AMD FX 8320
    Motherboard
    Crosshair V Formula-Z
    Memory
    16 gig DDR3
    Graphics Card(s)
    ASUS R9 270
    Screen Resolution
    1440x900
    Hard Drives
    1 TB Seagate Barracuda (starting to hate Seagate)
    x2 3 TB Toshibas
    Windows 8.1 is installed on a SanDisk Ultra Plus 256 GB
    PSU
    OCZ 500 watt
    Case
    A current work in progres as I'll be building the physical case myself. It shall be fantastic.
    Cooling
    Arctic Cooler with 3 heatpipes
    Keyboard
    Logitech K750 wireless solar powered keyboard
    Mouse
    Microsoft Touch Mouse
    Browser
    Internet Explorer 11
    Antivirus
    Windows Defender, but I might go back on KIS 2014
Back up your data offline.... Back up your data offline.... :cry:

Those back up sites are not safe either. I personally keep 3 HDD; one I use online; one in a networked backup PC that does not accept data from the internet and the last one is in a drawer. I remember in the past having my HDD root infected and the only way to fix that is a low-level format. HDD are cheap, cheap, cheap....
 

My Computer

System One

  • OS
    Windows 8 Pro
    System Manufacturer/Model
    Dell Inspiron 1750
    CPU
    Duo Core 2.5 G HZ
I have a neighbor lady, who is just a wonderful lady, mother and grandmother, but I know more about a nuclear reactor than she does about running a computer. So stuff happens! In spite of all the protection software I've installed on her PC and the sheets of instructions I've given her on how to update and run scans with her Security Software, she recently picked up a bug, that really screwed up her Windows 7.

So after doing a Verification on the Latest Ghost Backup that I did on that PC, I reformatted her C: partition and Restored that latest Ghost backup. Total time....... less than an hour and she was back up and running normally again.
Then I took another hour to bring all her software up to date and then I made another Ghost Backup.

Since CD/DVD drives are so easily messed up, (in a years time, I replace more DVD drives than any other computer part) I run Ghost from a Bootable Flash Drive. And a Flash Drive boots quicker too.

So your best backup is the one you can lay your hands on, in just a few moments, even when your computer is not running.... not off in a cloud somewhere.

Happy New Year!
TechnoMage :cool:
 

My Computer

System One

  • OS
    Win-8.1/Pro/64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Acer X-1200
    CPU
    AMD 2 Core
    Motherboard
    Acer
    Memory
    Crucial, 4GB
    Graphics Card(s)
    NVIDEA GeForce 9200
    Sound Card
    On Board
    Monitor(s) Displays
    24" Acer
    Hard Drives
    Sandisk, SSD 500GB
    PSU
    Acer
    Case
    SFF Slimline
    Keyboard
    emachines 101 key
    Mouse
    Logitech Wireless
    Internet Speed
    5 Meg
    Browser
    Firefox
    Antivirus
    Windows Defender
    Other Info
    Using Classic Shell on Win-8.1 /pro/64
I actually know of a girl that got hit with the cryptolocker virus. I was told by a friend who goes to college with her and she said that she was freaking out and went to the not so best buy to see if they can fix it. Obviously not.

It's so strange, I live in a smallish area and this stuff can happen, it's crazy.
 

My Computer

System One

  • OS
    Windows 8.1 Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    ASUS
    CPU
    AMD FX 8320
    Motherboard
    Crosshair V Formula-Z
    Memory
    16 gig DDR3
    Graphics Card(s)
    ASUS R9 270
    Screen Resolution
    1440x900
    Hard Drives
    1 TB Seagate Barracuda (starting to hate Seagate)
    x2 3 TB Toshibas
    Windows 8.1 is installed on a SanDisk Ultra Plus 256 GB
    PSU
    OCZ 500 watt
    Case
    A current work in progres as I'll be building the physical case myself. It shall be fantastic.
    Cooling
    Arctic Cooler with 3 heatpipes
    Keyboard
    Logitech K750 wireless solar powered keyboard
    Mouse
    Microsoft Touch Mouse
    Browser
    Internet Explorer 11
    Antivirus
    Windows Defender, but I might go back on KIS 2014
We recently came across a CryptoLocker variant that had one notable feature—it has propagation routines.

Analysis of the malware, detected as WORM_CRILOCK.A, shows that this malware can spread via removable drives. This update is considered significant because this routine was unheard of in other CRILOCK variants. The addition of propagation routines means that the malware can easily spread, unlike other known CRILOCK variants.
Aside from its propagation technique, the new malware bears numerous differences from known CryptoLocker variants. Rather than relying on a downloader malware—often UPATRE— to infect systems, this malware pretends to be an activator for various software such as Adobe Photoshop and Microsoft Office in peer-to-peer (P2P) file sharing sites. Uploading the malware in P2P sites allows bad guys to easily infect systems without the need to create (and send) spammed messages.

Here is the full blog post.. New CryptoLocker Spreads Via Removable Drives | Security Intelligence Blog | Trend Micro
 

My Computer

System One

  • OS
    Windows 8.1 Enterprise
CryptoLocker's nightmarish. I always back up my most vital files, to which people wonder why I keep multiple copies of my stuff on several different computers as well as flashdrives and burned discs. I'm pretty careful, I don't download files that end in .exe except from reputable sources- any music, picture or document that ends in .exe is not what it seems but unfortunately many people just hit permissions through.

Also I don't download .zips or open message attachments from people I don't know and I don't follow the links either. People have to use the same common sense they do in the real world on the internet. But at the same time, I hope they find and nail the authors/creators of this and make an example out of them. It's odd that no one has been able to track down those responsible- I mean they took a police department and the FBI for a ride, and just nothing. But greed will probably be the Achilles heel in this operation- unlike a purely destructive attack- the whole point of ransomware is a payday and things that are untraceable now aren't going to remain so. The flow of Bitcoins for example, will be a testament to how greedy the developers are. If they're as canny as they were in their creation of the virus, they will stop at some point to prevent detection.

But the very fact they are asking such a steep price from every victim means their money induced haze will probably overpower common sense.
 

My Computer

System One

  • OS
    Windows 10 64-bit/ Windows 8.1 64-bit
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Desktop: Allison Designs by Austin Computers / Laptop: Toshiba Satellite L50-A006
    CPU
    Intel Core i5- 4590/ Intel Core i5 processor 4200U
    Motherboard
    Gigabyte H97M-D3H/ ?
    Memory
    16 GB Kingston at 1600 Mhz/ 4GB
    Graphics Card(s)
    Gigabyte Geforce GTX 760 OC Windforce (2 GB/256-bit)/ nVIDIA GeForce GT 740M 2GB
    Sound Card
    Onboard Audio'
    Monitor(s) Displays
    AOC 2216Vw 22"/ 15.6" Widescreen HD LED Backlit Display
    Screen Resolution
    1680*1050 / 1366*768
    Hard Drives
    2 TB Western Digital Black Caviar Drive (7200 RPM)/ 750GB (5400rpm) with Toshiba HDD Accelerator
    PSU
    Coolermaster 750W VS Series 80+ Gold Power Supply (Desktop Only)
    Case
    Corsair Carbide SPEC-02 Mid Tower Gaming Case (Desktop Only)
    Cooling
    Two Case 120 mm fans and GPU, CPU, PSU cooled by own fans respectively. (Desktop Only)
    Keyboard
    Microsoft Wired Keyboard Desktop 600 (Desktop Only)
    Mouse
    Microsoft Wired Mouse 600/ Toshiba Touchpad and Logitech Mouse
    Browser
    Internet Explorer and Google Chrome
    Antivirus
    Norton 360 by Symantec
Back
Top