Systems Affected
Microsoft Windows systems running Windows 7, Vista, and XP operating systems
Overview
US-CERT is aware of a malware campaign that surfaced in 2013 and is associated with an increasing number of ransomware infections. CryptoLocker is a new variant of ransomware that restricts access to infected computers and demands the victim provide a payment to the attackers in order to decrypt and recover their files. As of this time, the primary means of infection appears to be phishing emails containing malicious attachments.
Description
CryptoLocker appears to have been spreading through fake emails designed to mimic the look of legitimate businesses and through phony FedEx and UPS tracking notices. In addition, there have been reports that some victims saw the malware appear following after a previous infection from one of several botnets frequently leveraged in the cyber-criminal underground.
Impact
The malware has the ability to find and encrypt files located within shared network drives, USB drives, external hard drives, network file shares and even some cloud storage drives. If one computer on a network becomes infected, mapped network drives could also become infected. CryptoLocker then connects to the attackers’ command and control (C2) server to deposit the asymmetric private encryption key out of the victim’s reach.
Victim files are encrypted using asymmetric encryption. Asymmetric encryption uses two different keys for encrypting and decrypting messages. Asymmetric encryption is a more secure form of encryption as only one party is aware of the private key, while both sides know the public key.
While victims are told they have three days to pay the attacker through a third-party payment method (MoneyPak, Bitcoin), some victims have claimed online that they paid the attackers and did not receive the promised decryption key. US-CERT and DHS encourage users and administrators experiencing a ransomware infection NOT to respond to extortion attempts by attempting payment and instead to report the incident to the FBI at the Internet Crime Complaint Center (IC3).
Solution
Prevention
US-CERT recommends users and administrators take the following preventative measures to protect their computer networks from a CryptoLocker infection:
Do not follow unsolicited web links in email messages or submit any information to webpages in links
Use caution when opening email attachments. Refer to the Security Tip Using Caution with Email Attachments for more information on safely handling email attachments
Maintain up-to-date anti-virus software
Perform regular backups of all systems to limit the impact of data and/or system loss
Apply changes to your Intrusion Detection/Prevention Systems and Firewalls to detect any known malicious activity
Secure open-share drives by only allowing connections from authorized users
Keep your operating system and software up-to-date with the latest patches
Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams
Refer to the Security Tip Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks
Mitigation
US-CERT suggests the following possible mitigation steps that users and administrators can implement, if you believe your computer has been infected with CryptoLocker malware:
Immediately disconnect the infected system from the wireless or wired network. This may prevent the malware from further encrypting any more files on the network
Users who are infected should change all passwords AFTER removing the malware from their system
Users who are infected with the malware should consult with a reputable security expert to assist in removing the malware, or users can retrieve encrypted files by the following methods:
Restore from backup,
Restore from a shadow copy or
Perform a system restore.
References
CryptoLocker Virus: New Malware Holds Computers For Ransom, Demands $300 Within 100 Hours And Threatens To Encrypt Hard Drive
CryptoLocker Wants Your Money!
CryptoLocker ransomware – see how it works, learn about prevention, cleanup and recovery
Microsoft Support – Description of the Software Restriction Policies in Windows XP
Microsoft Software Restriction Policies Technical Reference – How Software Restriction Policies Work
CryptoLocker Ransomware Information Guide and FAQ
Revisions
Initial
source: http://www.us-cert.gov/ncas/alerts/TA13-309A
Tags:
NavyDads mission is to Provide Support, Encouragement, and Knowledge to Sailors and their Families throughout their Journey together in the United States Navy.
NavyDads can only succeed with your help. We receive no outside funding and every dollar you donate helps us cover operating costs and helps keep this site running.
November 26, 2024 from 4pm to 8pm – Lakehurst Event Center
0 Comments 0 LikesDecember 4, 2024 from 4pm to 8pm – Lakehurst Event Center
0 Comments 0 LikesDecember 11, 2024 from 4pm to 8pm – Lakehurst Event Center
0 Comments 0 LikesDecember 18, 2024 from 4pm to 8pm – Lakehurst Event Center
0 Comments 0 LikesJanuary 8, 2025 from 4pm to 8pm – Lakehurst Event Center
0 Comments 0 LikesPosted by Scott Shiley on June 21, 2024 at 8:44am 5 Comments 0 Likes
Posted by Michael J Conway on April 18, 2023 at 4:08pm 0 Comments 0 Likes
Posted by Joseph Hernandez on January 28, 2023 at 11:54am 1 Comment 1 Like
Posted by Philip Steinert on January 2, 2023 at 2:10pm 2 Comments 0 Likes
Posted by william joseph wolfcale on December 3, 2022 at 4:08pm 2 Comments 2 Likes
Posted by william joseph wolfcale on December 3, 2022 at 4:00pm 0 Comments 0 Likes
Posted by Michael J Conway on November 13, 2022 at 9:55pm 1 Comment 0 Likes
Posted by Jeff J Sperekas on June 25, 2022 at 7:33pm 1 Comment 0 Likes
Posted by Wesley Scott Phillips on January 5, 2022 at 11:37am 3 Comments 0 Likes
Posted by John W Hensman on October 9, 2021 at 4:21pm 0 Comments 1 Like
Posted by John D O'Rourke on September 16, 2021 at 5:58am 2 Comments 1 Like
Posted by Mark F Durovka on March 22, 2021 at 8:46pm 2 Comments 2 Likes
Posted by Thomas ODonnell on January 10, 2021 at 3:00pm 7 Comments 0 Likes
Posted by Jim Lisi on December 13, 2020 at 1:21pm 3 Comments 1 Like
Posted by Elliott Peigen on September 7, 2020 at 9:56am 2 Comments 0 Likes
Posted by John Lillyblad on March 18, 2020 at 4:38pm 5 Comments 0 Likes
Posted by Fernando Bolano on March 17, 2020 at 2:36pm 3 Comments 0 Likes
Posted by Chris Koning on February 9, 2020 at 3:54pm 0 Comments 0 Likes
Posted by Mike Cunningham on February 3, 2020 at 2:15pm 1 Comment 0 Likes
Posted by Mike Cunningham on January 15, 2020 at 1:23pm 2 Comments 0 Likes
© 2024 Created by E.G. - ND's Creator/Admin. Powered by
NavyDads.Com is a private web community consisting of Navy Families, Supporters, and Sailors. NavyDads is not affiliated with
the United States Navy and the views expressed here are solely those of our admins / members on NavyDads.Com
© 2020 NavyDads LLC. All rights reserved.