{"id":6397,"date":"2013-10-25T18:18:46","date_gmt":"2013-10-25T22:18:46","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=6397"},"modified":"2013-10-25T18:18:46","modified_gmt":"2013-10-25T22:18:46","slug":"cryptolocker-ransomware-at-its-worst","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/cryptolocker-ransomware-at-its-worst\/","title":{"rendered":"CryptoLocker &#8212; Ransomware at its worst"},"content":{"rendered":"<p>There&#8217;s a relatively new variant of an older Trojan\/worm spreading across the Internet and this one is unusually bad because of the way it works and because if you&#8217;re not wary it could cost you $300 or more &#8212; and because most antivirus programs don&#8217;t catch it until it is too late.<\/p>\n<p>It&#8217;s commonly called CryptoLocker &#8212; it&#8217;s been around for a few months now.. While it&#8217;s several months old, it has started to spread across the Internet and is becoming more and more prevalent and more and more people are becoming infected. So it now more likely you&#8217;re going to come in contact with it sooner or later.<\/p>\n<p>It&#8217;s a particularly nasty ransomware variant in that it encrypts various file types on your computer and locks them so you can&#8217;t access them unless you have a key to decrypt them. Of course, the miscreants who developed this ransomware, want you to pay them $100 to $300 or more for the decryption key that will decrypt the files and allow you to access them. If you don&#8217;t pay the ransom, the files will remain locked and you&#8217;ll not be able to access them, even if you subsequently remove the ransomware from your computer. <\/p>\n<p>CryptoLocker spreads by email&#8230;and this method of distribution is not new. It generally comes as a business email supposedly from FedEx, UPS, Amazon or some other company most of us are likely to have had done business with. The first clue you should have that something is amiss, is that the letter is poorly written &#8212; obviously not composed by someone who speaks English as their first language. This email comes with an attachment which carries the ransomware and if clicked with start the program and then start encrypting files on all drives in or attached to your computer. <\/p>\n<p>We have reminded all of you many times: Never click a link in an email if you&#8217;re not sure who the email is from and you don&#8217;t know where the link leads. And NEVER NEVER NEVER open an attachment if you were not expecting an attachment and you are sure you know who it came from. <\/p>\n<p>While most antivirus products won&#8217;t stop this worm from infecting your computer, Emsisoft will stop it and you&#8217;ll be protected from it. It&#8217;s one of the few security products which proactively prevent this worm from infecting your computer. In fact, Emsisoft wrote a blog about this particular ransomware in September &#8212; and we are featuring it in today&#8217;s newsletter &#8211; and we will publish it on our InfoAve site at <a href=\"http:\/\/thundercloud.net\/infoave\/new\/\" target=\"_blank\">http:\/\/thundercloud.net\/infoave\/new\/<\/a><\/p>\n<p>What file types are affected by this worm? Here are some, but not all, of the file types it will encrypt on your computer. One they have been encrypted, you will not be able to access them: *.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.pdf, *.eps, *.ai, *.indd, *.cdr, *.jpg, *.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c. <\/p>\n<p>When it has finished encrypting your data files it will display the CryptoLocker screen:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" border=\"0\" alt=\"Cloudeight Internet\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2014\/cyptolocker3.png\" width=\"600\" height=\"470\"\/> <\/p>\n<p>CryptoLocker wants you to pay the ransom by sending 2 bitcoins to an address (URL) that is dynamically generated. Bitcoin payments cannot be traced. A Bitcoin is worth around $200 U.S.D. If you want to know more about what Bitcoins are see <a href=\"http:\/\/en.wikipedia.org\/wiki\/Bitcoin\">http:\/\/en.wikipedia.org\/wiki\/Bitcoin<\/a>&nbsp; . If you don&#8217;t want to get the details about Bitcoin &#8212; essentially it&#8217;s a way to pay and get paid anonymously &#8212; payments cannot be traced back to the payee or payer (theoretically &#8212; the NSA and FBI not withstanding).  <\/p>\n<p>As we said, once you&#8217;re infected, removing the infection will not decrypt the encrypted files. So the best way to avoid all this is to not become infected. As we pointed out, Emsisoft is one of the very few antivirus\/anti-malware programs that will prevent you from becoming infected in the first place. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" border=\"0\" alt=\"Cloudeight Internet\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2014\/emsi-cryptolocker.png\" width=\"600\" height=\"537\"\/><br \/>Above &#8211; Emsisoft blocking CryptoLocker <\/p>\n<p><em>Users of Emsisoft Anti-Malware are not at risk of falling victim to either CryptoLocker or the malware downloader from the initial email campaign, unnoticed, as both are no match for our award winning behavior blocking technology.<\/em> <\/p>\n<p>But we know, not all of you have Emsisoft &#8212; so what happens if you do become infected?<\/p>\n<p>#!. DO NOT PAY THE RANSOM.<br \/>No matter what &#8212; do not pay these criminals a cent.<\/p>\n<p>#2. Keep your pictures and documents and other important files backed up in &#8220;the cloud&#8221;. There are many good, free, cloud storage services and some offer a generous 5GB of space &#8212; and you can have more than one. Keep a good image back-up on an External drive &#8211; but keep in mind any drive attached to your computer is subject to infection.. Keep a backup of those files you simply cannot replace on off site on a good cloud storage service online. There is some suggestion that the CryptoLocker infection may encrypt files on external drives as well. These probably would not affect image backups since most backup programs store their backup files in proprietary format. But just in case, do use a good cloud storage service to back-up your irreplaceable files &#8212; pictures, documents, videos, movies, etc.<\/p>\n<p>#3. Don&#8217;t forget System Restore. System Restore offers you a way to restore your files to a time before you were infected.<\/p>\n<p>At the first sign of infection do this:<\/p>\n<p>1. Do not panic<br \/>2. Shut your computer off using the power switch \u2013 DO NOT REBOOT &#8211; some computers are made so the power switch is set to reboot the computer &#8212; only holding it in for several seconds will shut it down. It is important that the computer be turned off completely;&nbsp; if necessary unplug your computer from the wall.<br \/>3. Wait 2 minutes<br \/>4. Turn your computer back on using the power switch<br \/>5. Immediately after pressing the power switch, start pressing the F8 key continuously and rapidly until you see the Safe Mode boot menu<br \/>6. From the boot menu select \u201cSafe Mode with command prompt\u201d *** This is important *** if you choose any other version of safe mode, the CryptoLocker will load. Be sure to select SAFE MODE WITH COMMAND PROMPT<br \/>7. You will see Windows loading files \u2013 it may take a long time.<br \/>8. When everything is loaded, you\u2019ll see a black screen with a command prompt which looks like this: <strong>C:\\ &gt; <\/strong><br \/>9. At command prompt type RSTRUI.EXE (WINDOWS XP users see the note below* &#8211; Windows 8 and 8.1 users see note below **)<br \/>10. Windows System Restore will load \u2014 but it may take a very long time \u2013 don\u2019t panic, be patient.<br \/>11. Select a restore point at least 2 days prior before the date of the infection<br \/>12. Run System Restore<br \/>13. Once System Restore is finished, you\u2019ll boot into Windows and you be back to normal.<\/p>\n<p>*Windows XP users: At the command prompt type CD: C:\\Windows\\System32 (exactly like that) and press Enter. The command prompt will now look like this C:\\Windows\\System32&gt; . At that prompt, type RSTRUI.EXE and press Enter. Then follow the instructions above starting with #10.<\/p>\n<p>** Windows 8 and Windows 8.1 users: See this guide for booting into safe mode on Windows 8 and 8.1. <a href=\"http:\/\/www.howtogeek.com\/107511\/\">http:\/\/www.howtogeek.com\/107511\/<\/a><\/p>\n<p>A reminder: If you get infected, removing CryptoLocker with your antivirus program or anti-malware program (if they can even remove it) will not solve your problem; it will not unlock your files, so you will still not be able to access them. The files are encrypted and the only way you&#8217;ll be able to open them again is with the decryption key &#8212; which you don&#8217;t have and won&#8217;t have unless you pay the ransom&#8212; DO NOT PAY THE RANSOM no matter what. If you do you&#8217;ll be part of the problem because you&#8217;ll be encouraging the criminals to develop more of this kind of stuff.<\/p>\n<p>The best way to deal with this threat is to not get it in the first place. Emsisoft users are protected. If you don&#8217;t have Emsisoft (and even if you do) safe computer operating procedures are important. Never open an attachment you were not expecting AND do not open an attachment unless you&#8217;re positive you know who sent it. You cannot be positive by simply looking at the sender&#8217;s address &#8212; it could be forged. If in doubt, and it&#8217;s a friend of yours, call them or write them and ask if they sent you an attachment &#8212; and ask what it is. <\/p>\n<p>The best advice though is : NEVER open an attachment from an email.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a relatively new variant of an older Trojan\/worm spreading across the Internet and this one is unusually bad because of the way it works and because if you&#8217;re not wary it could cost you $300 or more &#8212; and because most antivirus programs don&#8217;t catch it until it is too late. It&#8217;s commonly called CryptoLocker &#8212; it&#8217;s\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/cryptolocker-ransomware-at-its-worst\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6397"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=6397"}],"version-history":[{"count":0,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/6397\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=6397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=6397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=6397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}