Beware: CryptoLocker Virus

Looks to be another nasty one.

A new computer virus is being called one of the strongest and most devastating viruses in history, strikes by literally holding the computer owners hostage, the Inquisitr reported.

The CryptoLocker Virus - which not only has the potential to destroy a computer hard drive, but holds the computer owners data ransom -infects computers through a legitimate-looking email, usually from a reputable company like FedEx or UPS. Once opened, the virus quickly spreads to the computer's hard drive and then offers the user a chance to rid the program for a hefty fee.

Crypto Locker Virus: New Aggressive Computer Virus Demands Ransom : News : University Herald
 
Make sure you format the hdd when you wipe it, the virus hides in the restore partition.
 

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    Laptop
    System Manufacturer/Model
    Sony Vaio
    Memory
    4Gb
    Graphics Card(s)
    Onboard
    Antivirus
    AVG
Never ever be stupid enough to pay the ransom. If you do you are as bad as the criminals, you are financially backing their next venture. And you deserve it when they don't decrypt your files.
 

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    Laptop
    System Manufacturer/Model
    Sony Vaio
    Memory
    4Gb
    Graphics Card(s)
    Onboard
    Antivirus
    AVG
If you get a suspect email, is there a way of analysing the attachment for cryptolocker without getting infected?

How about just summarily deleting .exe attachments? I'm unclear as to how these infections occur. Unless the malware is able to exploit a bug, email programs, browsers, etc shouldn't launch executables automatically, right? So people must be launching them directly from the program or saving them and carelessly running them, right?

The .exe files are hidden in .zip files or disguised as a .pdf file, but when you click on it, it is an .exe file and too late.

Yes, I understand that. So then, it's like I said, and people must be launching them directly from the program (disguised .pdf files) or saving them and carelessly running them, right?

I guess I've never been fooled by anything like this because (a) Turning on file extensions is one of the first things I do in my 30-step plan for installing Windows, (b) I never launch anything directly from a browser, (c) I always scan stuff I download, and (d) I only download from trusted sources. I've only ever run on-demand virus scans, and I've never had a virus or malware in 20 years of using the Internet. I'm surprised the .pdf.exe files are still a problem; that's something they were doing 10 years ago, and I thought it was a thing of the past.
 

My Computer

System One

  • OS
    Windows 8.1 Pro with Media Center

My Computer

System One

  • OS
    Windows 8.1 Pro x64 with Media Center, Windows 10 Pro x64, Windows 7 x64 Ultimate SP1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Custom System
    CPU
    INTEL Xeon E5-2670 LGA 2011
    Motherboard
    Gigabyte GA X79 UD5 v1.0 F13s
    Memory
    64GB (8 X 8 GB) G-Skill Ripjaws Z DDR3 2133 Quad Channel
    Graphics Card(s)
    EVGA GTX 1060 SC 3 GB
    Sound Card
    Realtek Onboard ALC898
    Monitor(s) Displays
    2 x Samsung S27E310
    Screen Resolution
    1920 x 1080
    Hard Drives
    Samsung 850 PRO 256 GB SSD
    1 x 6TB WD 6003FZBX SATA
    13 x 3TB WD 30EFRX SATA
    PSU
    Seasonic X-1050
    Case
    Thermaltake Armor+
    Cooling
    INTEL BXRTS2011LC Liquid-cooled
    Keyboard
    Logitech G510s
    Mouse
    Microsoft Wireless Explorer Mouse
    Internet Speed
    7.0 Mb/s
    Browser
    IE 11, Chrome
    Antivirus
    ESET NOD32 11.1, Malwarebytes Pro 3.5.1
    Other Info
    ASUS RT-AC68U router
Hadn't tested that, since it uses GP, it may have been assumed. Perhaps it just changes the registry as GP would, rather then use GP. A Guy
 

My Computer

System One

  • OS
    Windows 10 Home x64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Custom
    CPU
    INTEL Core i5-750
    Motherboard
    ASUS P7P55D
    Memory
    KINGSTON HyperX Fury Black Series 8GB (2 x 4GB) 1866Mhz
    Graphics Card(s)
    EVGA GTX750
    Monitor(s) Displays
    LG 27MP33HQ 32" IPS LED
    Screen Resolution
    1920 x 1080
    Hard Drives
    Samsung 840 Evo 120 GB, 2 x SEAGATE 500GB Barracuda® 7200.12, SATA 3 Gb/s, 7200 RPM, 16MB cache
    PSU
    ANTEC TruePower New TP-550, 80 PLUS®, 550W
    Case
    ANTEC Three Hundred Illusion
    Cooling
    COOLER MASTER Hyper 212 Plus, 3 x 120mm 1 x 140mm Case
    Internet Speed
    20 + Mbps
    Browser
    Vivaldi
    Antivirus
    Avast

My Computer

System One

  • OS
    Windows 8.1 Pro x64 with Media Center, Windows 10 Pro x64, Windows 7 x64 Ultimate SP1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Custom System
    CPU
    INTEL Xeon E5-2670 LGA 2011
    Motherboard
    Gigabyte GA X79 UD5 v1.0 F13s
    Memory
    64GB (8 X 8 GB) G-Skill Ripjaws Z DDR3 2133 Quad Channel
    Graphics Card(s)
    EVGA GTX 1060 SC 3 GB
    Sound Card
    Realtek Onboard ALC898
    Monitor(s) Displays
    2 x Samsung S27E310
    Screen Resolution
    1920 x 1080
    Hard Drives
    Samsung 850 PRO 256 GB SSD
    1 x 6TB WD 6003FZBX SATA
    13 x 3TB WD 30EFRX SATA
    PSU
    Seasonic X-1050
    Case
    Thermaltake Armor+
    Cooling
    INTEL BXRTS2011LC Liquid-cooled
    Keyboard
    Logitech G510s
    Mouse
    Microsoft Wireless Explorer Mouse
    Internet Speed
    7.0 Mb/s
    Browser
    IE 11, Chrome
    Antivirus
    ESET NOD32 11.1, Malwarebytes Pro 3.5.1
    Other Info
    ASUS RT-AC68U router

My Computer

System One

  • OS
    Windows 10 Home x64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Custom
    CPU
    INTEL Core i5-750
    Motherboard
    ASUS P7P55D
    Memory
    KINGSTON HyperX Fury Black Series 8GB (2 x 4GB) 1866Mhz
    Graphics Card(s)
    EVGA GTX750
    Monitor(s) Displays
    LG 27MP33HQ 32" IPS LED
    Screen Resolution
    1920 x 1080
    Hard Drives
    Samsung 840 Evo 120 GB, 2 x SEAGATE 500GB Barracuda® 7200.12, SATA 3 Gb/s, 7200 RPM, 16MB cache
    PSU
    ANTEC TruePower New TP-550, 80 PLUS®, 550W
    Case
    ANTEC Three Hundred Illusion
    Cooling
    COOLER MASTER Hyper 212 Plus, 3 x 120mm 1 x 140mm Case
    Internet Speed
    20 + Mbps
    Browser
    Vivaldi
    Antivirus
    Avast
How much damage can this thing do to a domain connected PC running a restricted account profile in XP? I'm going to assume it will encrypt all files within the user profile and whatever network shares it has permission to access? Upon infection, would it be safe to delete the user profile, delete all restore points and create a new profile?
 

My Computer

System One

  • OS
    Windows 10 Pro 64-bit
    Computer type
    PC/Desktop
    CPU
    AMD Athlon II X2 260 @ 3.2GHz
    Motherboard
    Asus M4A88T-EVO
    Memory
    8GB
    Graphics Card(s)
    Asus Radeon R7 240 2GB
    Sound Card
    Realtek Integrated
    PSU
    Seasonic
I believe it only accesses mapped network drives. When infected format the hard drive, it hides in the restore areas.
 

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    Laptop
    System Manufacturer/Model
    Sony Vaio
    Memory
    4Gb
    Graphics Card(s)
    Onboard
    Antivirus
    AVG
I believe it only accesses mapped network drives. When infected format the hard drive, it hides in the restore areas.

Not according to the first post of this thread:
A new computer virus is being called one of the strongest and most devastating viruses in history, strikes by literally holding the computer owners hostage, the Inquisitr reported.

The CryptoLocker Virus - which not only has the potential to destroy a computer hard drive, but holds the computer owners data ransom -infects computers through a legitimate-looking email, usually from a reputable company like FedEx or UPS. Once opened, the virus quickly spreads to the computer's hard drive and then offers the user a chance to rid the program for a hefty fee.
 

My Computer

System One

  • OS
    Windows 10 Pro 64-bit
    Computer type
    PC/Desktop
    CPU
    AMD Athlon II X2 260 @ 3.2GHz
    Motherboard
    Asus M4A88T-EVO
    Memory
    8GB
    Graphics Card(s)
    Asus Radeon R7 240 2GB
    Sound Card
    Realtek Integrated
    PSU
    Seasonic
Yes it infects local drives too
 

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    Laptop
    System Manufacturer/Model
    Sony Vaio
    Memory
    4Gb
    Graphics Card(s)
    Onboard
    Antivirus
    AVG
How much damage can this thing do to a domain connected PC running a restricted account profile in XP? I'm going to assume it will encrypt all files within the user profile and whatever network shares it has permission to access? Upon infection, would it be safe to delete the user profile, delete all restore points and create a new profile?

The machine I cleaned up was networked but didn't have drives mapped. It infected all of the machine's data files but nothing on the networked machine. My client was very agreeable to a fresh install so I didn't do much in the way of trying to clean his machine. Although I read that Security Esssentials was detecting the malware a week or two earlier it didn't pick up this variant until a day or two after he was infected. Verified by downloading to one of our test machines.
 

My Computer

System One

  • OS
    Win 8.1
    Computer type
    PC/Desktop
How much damage can this thing do to a domain connected PC running a restricted account profile in XP? I'm going to assume it will encrypt all files within the user profile and whatever network shares it has permission to access? Upon infection, would it be safe to delete the user profile, delete all restore points and create a new profile?

The machine I cleaned up was networked but didn't have drives mapped. It infected all of the machine's data files but nothing on the networked machine. My client was very agreeable to a fresh install so I didn't do much in the way of trying to clean his machine. Although I read that Security Esssentials was detecting the malware a week or two earlier it didn't pick up this variant until a day or two after he was infected. Verified by downloading to one of our test machines.

I would be very interested to know if it can "break out" of a profile that doesn't have admin privileges and infect the rest of the computer.
 

My Computer

System One

  • OS
    Windows 10 Pro 64-bit
    Computer type
    PC/Desktop
    CPU
    AMD Athlon II X2 260 @ 3.2GHz
    Motherboard
    Asus M4A88T-EVO
    Memory
    8GB
    Graphics Card(s)
    Asus Radeon R7 240 2GB
    Sound Card
    Realtek Integrated
    PSU
    Seasonic
It can only infect to the extent of the infected user rights
 

My Computer

System One

  • OS
    Windows 8.1
    Computer type
    Laptop
    System Manufacturer/Model
    Sony Vaio
    Memory
    4Gb
    Graphics Card(s)
    Onboard
    Antivirus
    AVG
... but if the user has rights to change a file or document, it can encrypt those files, which means it can cause a lot of damage.
 

My Computer

System One

  • OS
    Windows 8.1, 10
... but if the user has rights to change a file or document, it can encrypt those files, which means it can cause a lot of damage.

This would = a very crappy day at my workplace. I'm very tempted to install cryptoprotect on all the machines @ work. Do AV vendors have this menace in their defs yet?
 

My Computer

System One

  • OS
    Windows 10 Pro 64-bit
    Computer type
    PC/Desktop
    CPU
    AMD Athlon II X2 260 @ 3.2GHz
    Motherboard
    Asus M4A88T-EVO
    Memory
    8GB
    Graphics Card(s)
    Asus Radeon R7 240 2GB
    Sound Card
    Realtek Integrated
    PSU
    Seasonic
Just a question, no political overtone is intended...

Since the NSA, FBI, CIA, etc., monitor internet traffic, shouldn't they be able to eradicate this and other type of malware once it has been identified? If they can tap world leaders cell phones for years, identifying the hackers seems like an easier task.

After all, the US government does have a cyber security initiative and one of its tenet is "Collaborate and share your knowledge". While the initiative is intended to protect the government and critical infrastructure from cyber warfare, the public perception of the US intelligence services would be different, if they'd utilize their monitoring to protect people from malware. I for one would applaud, if they'd do, and may not view them as critically as I do now...
 

My Computer

System One

  • OS
    Win 8.1
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Dell Latitude
    CPU
    Intel i5-3350P (3.1 GHz)
    Motherboard
    Gigabyte
    Memory
    16 GBs
    Graphics Card(s)
    AMD Radeon HD7850
    Sound Card
    Built-in to MB
    Monitor(s) Displays
    2 x 24" Dell
    Screen Resolution
    3,840 x1,200
    Hard Drives
    128 GBs, OCZ Vertex, SATA III SSD
    256 GBs Intel SATA III SSD
    3 x Seagate 1 TBs HDD
    PSU
    Antec 750W
    Case
    Antec P185
    Internet Speed
    50 Gb/s
    Browser
    IE11, Firefox22.0
    Antivirus
    Vipre
    Other Info
    Works, most of the times unless Microsoft patches decide otherwise...
Just a question, no political overtone is intended...

Since the NSA, FBI, CIA, etc., monitor internet traffic, shouldn't they be able to eradicate this and other type of malware once it has been identified? If they can tap world leaders cell phones for years, identifying the hackers seems like an easier task.

After all, the US government does have a cyber security initiative and one of its tenet is "Collaborate and share your knowledge". While the initiative is intended to protect the government and critical infrastructure from cyber warfare, the public perception of the US intelligence services would be different, if they'd utilize their monitoring to protect people from malware. I for one would applaud, if they'd do, and may not view them as critically as I do now...

I've always thought it would be a good idea to implement some sort of backbone malware filtering, so as long as its operated by a non-government/politically motivated organization, with clear rules from the outset prohibiting it from intentional filtering of non-malicious content.

Has anyone tested Sandboxie to see if this thing can break out of its sandbox?

Sandboxie - Sandbox software for application isolation and secure Web browsing
 

My Computer

System One

  • OS
    Windows 10 Pro 64-bit
    Computer type
    PC/Desktop
    CPU
    AMD Athlon II X2 260 @ 3.2GHz
    Motherboard
    Asus M4A88T-EVO
    Memory
    8GB
    Graphics Card(s)
    Asus Radeon R7 240 2GB
    Sound Card
    Realtek Integrated
    PSU
    Seasonic
CryptoLocker developer launches Decryption websie; 10 Bitcoins for Decryption Keys

There's an extraordinary malware making rock-n-roll over the Internet and if you are one of the unlucky folks to cross its path, then it could make your computer unusable and you have to pay a few hundred Dollars to retrieve your important data back.

We have warned our readers in many previous articles about a nasty piece of Ransomware malware called 'CryptoLocker', which is targeting computers running the Microsoft Windows operating system.

The CryptoLocker Ransomware encrypts the files on a victim’s computer and issues an ultimatum - Pay up or lose your data. Users who are getting infected with CryptoLocker can see a message informing them that their computer is locked up and their files encrypted. It then asks them to make a ransom payment, which typically ranges between $100 and $700 or 2 Bitcoins, to get their files back.

Source

A Guy
 

My Computer

System One

  • OS
    Windows 10 Home x64
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Custom
    CPU
    INTEL Core i5-750
    Motherboard
    ASUS P7P55D
    Memory
    KINGSTON HyperX Fury Black Series 8GB (2 x 4GB) 1866Mhz
    Graphics Card(s)
    EVGA GTX750
    Monitor(s) Displays
    LG 27MP33HQ 32" IPS LED
    Screen Resolution
    1920 x 1080
    Hard Drives
    Samsung 840 Evo 120 GB, 2 x SEAGATE 500GB Barracuda® 7200.12, SATA 3 Gb/s, 7200 RPM, 16MB cache
    PSU
    ANTEC TruePower New TP-550, 80 PLUS®, 550W
    Case
    ANTEC Three Hundred Illusion
    Cooling
    COOLER MASTER Hyper 212 Plus, 3 x 120mm 1 x 140mm Case
    Internet Speed
    20 + Mbps
    Browser
    Vivaldi
    Antivirus
    Avast
Back
Top