{"id":504,"date":"2013-10-26T10:22:25","date_gmt":"2013-10-26T14:22:25","guid":{"rendered":"http:\/\/templesystems.com\/?page_id=504"},"modified":"2013-10-26T10:25:54","modified_gmt":"2013-10-26T14:25:54","slug":"cryptolocker","status":"publish","type":"page","link":"https:\/\/templesystems.com\/?page_id=504","title":{"rendered":"Cryptolocker"},"content":{"rendered":"<p><strong>This is from windowssecrets.com:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: medium;\">CryptoLocker: A particularly pernicious virus<\/span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/windowssecrets.com\/wp-content\/uploads\/2012\/09\/Susan-Bradley_avatar.jpg\" alt=\"Susan Bradley\" width=\"100\" height=\"100\" align=\"left\" \/>By Susan Bradley<\/p>\n<p><span style=\"font-size: x-small;\">Online attackers are using encryption to lock up our files and demand a ransom \u2014 and AV software probably won&#8217;t protect you.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Here are ways to defend yourself from CryptoLocker \u2014 pass this information along to friends, family, and business associates.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Forgive me if I sound a bit like those bogus virus warnings proclaiming, &#8220;You have the worst virus ever!!&#8221; But there&#8217;s a new threat to our data that we need to take seriously. It&#8217;s already hit many consumers and small businesses. Called CryptoLocker, this infection shows up in two ways.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">First, you see a red banner (see Figure 1) on your computer system, warning that your files are now\u00a0<em>encrypted<\/em>\u2014 and if you send money to a given email address, access to your files will be restored to you.<\/span><\/p>\n<div><img decoding=\"async\" title=\"CryptoLocker warning\" src=\"http:\/\/windowssecrets.com\/wp-content\/uploads\/2013\/10\/W20131024-TS-CryptoLocker.png\" alt=\"CryptoLocker warning\" \/><span style=\"font-size: x-small;\">Figure 1. CryptoLocker is not making idle threats.<\/span><\/div>\n<p><span style=\"font-size: x-small;\">The other sign you&#8217;ve been hit: you can no longer open Office files, database files, and most other common documents on your system. When you try to do so, you get another warning, such as &#8220;Excel cannot open the file [filename] because the file format or file extension is not valid,&#8221; as stated on a TechNet MS Excel Support Team<a href=\"http:\/\/blogs.technet.com\/b\/the_microsoft_excel_support_team_blog\/archive\/2013\/09\/07\/quot-cannot-open-the-file-because-the-file-format-or-extension-is-invalid-quot-opening-office-files.aspx\" target=\"_blank\">blog<\/a>.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">As noted in a Reddit\u00a0<a href=\"http:\/\/www.reddit.com\/r\/sysadmin\/comments\/1mizfx\/proper_care_feeding_of_your_cryptolocker\/\" target=\"_blank\">comment<\/a>, CryptoLocker goes after dozens of file types such as\u00a0.doc, .xls, .ppt, .pst, .dwg, .rtf, .dbf, .psd, .raw, and .pdf.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">CryptoLocker attacks typically come in three ways:<\/span><\/p>\n<p><span style=\"font-size: x-small;\">1)\u00a0Via an email attachment. For example, you receive an email from a shipping company you do business with. Attached to the email is a\u00a0.zip\u00a0file. Opening the attachment launches a virus that finds and encrypts all files you have access to \u2014 including those located on any attached drives or mapped network drives.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">2)\u00a0You browse a malicious website that exploits vulnerabilities in an out-of-date version of Java.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">3)\u00a0Most recently, you&#8217;re tricked into downloading a malicious video driver or codec file.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">There are no patches to undo CryptoLocker and, as yet, there&#8217;s no clean-up tool \u2014 the only sure way to get your files back is to restore them from a backup.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Some users have paid the ransom and, surprisingly, were given the keys to their data. (Not completely surprising; returning encrypted files to their owners might encourage others to pay the ransom.) This is, obviously, a risky option. But if it&#8217;s the only way you\u00a0<em>might<\/em>\u00a0get your data restored, use a\u00a0<em>prepaid debit card<\/em>\u00a0\u2014 not your personal credit card. You don&#8217;t want to add the insult of identity theft to the injury of data loss.<\/span><\/p>\n<div><span style=\"font-size: small;\">In this case, your best defense is prevention<\/span><\/div>\n<p><span style=\"font-size: x-small;\">Keep in mind that antivirus software probably won&#8217;t prevent a CryptoLocker infection. In every case I&#8217;m aware of, the PC owner had an up-to-date AV application installed. Moreover, running Windows without admin rights does not stop or limit this virus. It uses social engineering techniques \u2014 and a good bit of fear, uncertainty, and doubt \u2014 to trick users into clicking a malicious download or opening a bogus attachment.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Your best prevention is two-fold:<\/span><\/p>\n<p><span style=\"font-size: x-small;\">1) Basic method:\u00a0Ensure you keep complete and recent backups of your system. Making an image backup once or twice a year isn&#8217;t much protection. Given the size of today&#8217;s hard drives on standalone PCs, an external USB hard drive is still your best backup option. A 1TB drive is relatively cheap; you can get 3TB drives for under U.S. $200. For multiple PCs on a single local-area network, consider Michael Lasky&#8217;s recommendations in the Oct. 10 Best Hardware\u00a0<a href=\"https:\/\/windowssecrets.com\/best-hardware\/external-hard-drives-take-on-cloud-storage\/\" target=\"_blank\">article<\/a>, &#8220;External hard drives take on cloud storage.&#8221;<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Small businesses with networked PCs should have automated workstation backups enabled, in addition to server backups. At my office, I use Backup Box by Gramps&#8217;\u00a0Windows Storage Server 2008 R2 Essentials(<a href=\"http:\/\/www.smallbizserver.com\/\" target=\"_blank\">site<\/a>). It lets me join the backup server to my office domain and back up all workstations. I run the backups during the day, while others in the office are using their machines \u2014 and I&#8217;ve had no complaints of noticeable drops in workstation performance.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">The upcoming release of Windows Server 2012 R2 Essentials (<a href=\"http:\/\/www.microsoft.com\/en-us\/server-cloud\/products\/windows-server-2012-r2-essentials\/default.aspx#fbid=BnvBJKvxVfV\" target=\"_blank\">site<\/a>) will also include easy-to-use, workstation-backup capabilities. Recently\u00a0<a href=\"http:\/\/www.marketwatch.com\/story\/wd-introduces-new-ultra-compact-network-storage-plus-servers-2013-10-10?reflink=MW_news_stmp\" target=\"_blank\">announced<\/a>\u00a0Western Digital drives will also act as both file-storage servers and workstation-backup devices.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">2) The advanced method:\u00a0If you have Windows Professional or higher, you can tweak your systems to protect them against CryptoLocker. You&#8217;ll want to thoroughly test the impact of the settings changes detailed below \u2014 and be prepared to roll back to your original settings if needed. (After making some of these changes, you might not be able to install or update some applications.)<\/span><\/p>\n<p><span style=\"font-size: x-small;\">All business and Pro versions of Windows include the ability to prevent certain types of software from launching from specific locations. CryptoLocker launches from a specific location and in a specific way (well, for now). By implementing Windows&#8217; Software Restriction Policies rules, we can block CryptoLocker from launching its payload in your computer.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Software Restriction Policies (<a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb457006.aspx\" target=\"_blank\">more info<\/a>) were first introduced in Windows XP and Server 2003. In a domain setting, you can use\u00a0Group Policy\u00a0to set up these restrictions or rules; on standalone machines, you can useLocal Security Policy.\u00a0(Windows Home Premium doesn&#8217;t support Group or Local policies, so none of the following settings changes is supported.)<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Again, be sure you test these settings changes on a single workstation first before rolling them out to other systems. Also, take the extra step of\u00a0<em>undoing<\/em>\u00a0the changes and checking whether the test system still runs as expected. Most important: Back up\u00a0<em>all<\/em>\u00a0systems before making the changes.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">To make the changes, click Start\/Control Panel\/Administrative Tools. Click Local Security Policy and locate Software Restriction Policies under the Security Settings heading. Right-click it and select\u00a0New Software Restriction Policies.\u00a0Right-click Additional Rules and select\u00a0New Path Rule\u00a0to open the new-rule dialog box shown in Figure 2.<\/span><\/p>\n<div><img decoding=\"async\" title=\"New Path Rule\" src=\"http:\/\/windowssecrets.com\/wp-content\/uploads\/2013\/10\/W20131024-TS-LocalSecurityPolicy.png\" alt=\"New Path Rule\" \/><span style=\"font-size: x-small;\">Figure 2. Creating a new path rule to block CryptoLocker<\/span><\/div>\n<p><span style=\"font-size: x-small;\">The following rules block applications such as CryptoLocker from running in the defined locations. For example, the first set of rules applies to the specific user folder\u00a0%Appdata%,\u00a0which equates to\u00a0user\\{yourusername}\\appdata\\roaming.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Enter the following sets of Path, Security Level, and Description information as separate rules:<\/span><\/p>\n<p><span style=\"font-size: x-small;\"><em>For Windows XP<\/em>,\u00a0enter the following:<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%AppData%\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Don&#8217;t allow executables from AppData<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">and<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%AppData%\\*\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Don&#8217;t allow executables from AppData<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\"><em>For Windows Vista and higher<\/em>,\u00a0use the above settings plus the following:<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%localAppData%\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Don&#8217;t allow executables from AppData<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">and<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%localAppData%\\*\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Don&#8217;t allow executables from AppData<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">Additional paths for blocking ZIP-file locations are described in the\u00a0<a href=\"http:\/\/www.bleepingcomputer.com\/virus-removal\/cryptolocker-ransomware-information\" target=\"_blank\">bleepingcomputer.com CryptoLocker Ransomware Information Guide and FAQ<\/a>. The following will ensure the virus can&#8217;t launch from embedded or attached\u00a0.zip\u00a0files.<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%Temp%\\Rar*\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Block executables run from archive attachments opened with WinRAR.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">From archive attachments opened with\u00a07zip:<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%Temp%\\7z*\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Block executables run from archive attachments opened with 7-Zip.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">From archive attachments opened with\u00a0WinZip:<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%Temp%\\wz*\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Block executables run from archive attachments opened with WinZip.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">From archive attachments opened using\u00a0Windows&#8217; built-in .zip support:<\/span><\/p>\n<ul type=\"square\">\n<li><span style=\"font-size: x-small;\">Path:\u00a0%Temp%\\*.zip\\*.exe<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Security Level:\u00a0Disallowed<\/span><\/li>\n<li><span style=\"font-size: x-small;\">Description:\u00a0Block executables run from archive attachments opened using Windows&#8217; built-in ZIP support.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: x-small;\">Figure 3 shows the Software Restrictions Policies section with newly entered rules.<\/span><\/p>\n<div><img decoding=\"async\" title=\"New policies\" src=\"http:\/\/windowssecrets.com\/wp-content\/uploads\/2013\/10\/W20131024-TS-NewPolicies.png\" alt=\"New policies\" \/><span style=\"font-size: x-small;\">Figure 3. A completed set of software restriction policies<\/span><\/div>\n<p><span style=\"font-size: x-small;\">When you&#8217;re done entering new rules, reboot your system so that the changes take effect. Again, if you discover you can no longer update some applications or install software, you might need to undo some of these changes. Look in your\u00a0application event log\u00a0\u2014 or in the admin section \u2014 for the specific rule that&#8217;s misbehaving. (To open the log, click Control Panel\/Administrative Tools\/Event Viewer; then, in the navigation pane, click Windows Logs\/Application. For more on the Event Viewer, see the Oct. 27, 2011,\u00a0<a href=\"http:\/\/windowssecrets.com\/top-story\/what-you-should-know-about-windows-event-viewer\/\" target=\"_blank\">Top Story<\/a>, &#8220;What you should know about Windows&#8217; Event Viewer.&#8221;)<\/span><\/p>\n<p><span style=\"font-size: x-small;\">As the malware authors change their tactics, you might need to revisit the rules settings; I&#8217;ll try to post updates into the Windows Secrets Lounge whenever needed.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">For even stronger CryptoLocker protection, those folks with solid IT savvy might want to consider\u00a0application whitelisting\u00a0\u2014 i.e., setting up a list of applications approved to run on their workstations. All other software installations are blocked. See the National Security Agency (yes,\u00a0<em>that<\/em>\u00a0NSA)\u00a0<a href=\"http:\/\/www.nsa.gov\/ia\/_files\/os\/win2k\/Application_Whitelisting_Using_SRP.pdf\" target=\"_blank\">document<\/a>\u00a0(downloaded PDF), &#8220;Application whitelisting using Software Restriction Policies.&#8221;<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Be aware that application whitelisting is a highly advanced tactic. Take some time to determine\u00a0<em>all<\/em>\u00a0allowed applications in order to properly set up application whitelisting.<\/span><\/p>\n<p><span style=\"font-size: x-small;\">Once again, keeping your AV software up to date is not the panacea for CryptoLocker. The hackers using this exploit are adapting the virus so quickly that AV vendors can&#8217;t keep up with the many CryptoLocker variations in play. It&#8217;s up to individual users to stay vigilant about what they click. The bad guys just keep getting badder.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is from windowssecrets.com: &nbsp; CryptoLocker: A particularly pernicious virusBy Susan Bradley Online attackers are using encryption to lock up our files and demand a ransom \u2014 and AV software probably won&#8217;t protect you. Here are ways to defend yourself &hellip; <a href=\"https:\/\/templesystems.com\/?page_id=504\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":303,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-504","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/pages\/504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/templesystems.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=504"}],"version-history":[{"count":2,"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/pages\/504\/revisions"}],"predecessor-version":[{"id":506,"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/pages\/504\/revisions\/506"}],"up":[{"embeddable":true,"href":"https:\/\/templesystems.com\/index.php?rest_route=\/wp\/v2\/pages\/303"}],"wp:attachment":[{"href":"https:\/\/templesystems.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}