Malware Alert Malware Alert - Talk of The Villages Florida

Malware Alert

Closed Thread
Thread Tools
  #1  
Old 06-20-2014, 11:25 AM
dewilson58's Avatar
dewilson58 dewilson58 is offline
Sage
Join Date: May 2013
Location: South of 466a, if you don't like me.......I live in Orlando.
Posts: 12,784
Thanks: 1,005
Thanked 10,976 Times in 4,184 Posts
Default Malware Alert

RECEIVED FROM MY IT GUY


Threat Level: High

Geographical Distribution: Very High

Removal: Difficult

Affected Systems: Windows XP, Vista, 7, 8, All Windows Server OS

Information:

Two new variants of the CryptoLocker malware that was in the news last fall have begun circling the internet. The two variations are known as CryptoWall and CryptoDefense. They operate in a similar manner to Cryptolocker by encrypting the files on your network shares and denying users access until they pay the ransom between $300 and $1000 or restore their files from backup. This is a wide spread attack with a high distribution rate.

The current variant is being spread by email that appears to come from UPS or from a faxing service. The email either contains an attachment or a link to a website to open the notification, which then downloads the virus. Many antivirus vendors do not yet have definitions and these emails often slip by spam filters.

Recommendations:

We are recommending all clients notify their users to be wary of suspicious emails appearing to come from UPS or about faxing and also verify they have current backups. If you see any indication of malicious behavior immediately shutdown the infected machine and disconnect from the network.
  #2  
Old 06-20-2014, 11:45 AM
Kahuna32162's Avatar
Kahuna32162 Kahuna32162 is offline
Gold member
Join Date: Jul 2013
Posts: 1,244
Thanks: 109
Thanked 402 Times in 161 Posts
Default

verified on Snoops.com

Origins: The so-called "CryptoLocker virus" is an example of ransomware, a class of malware that, once it has infected a particular computer system, restricts access to that system until the user pays a ransom. CryptoLocker is a particular form of ransomware known as cryptoviral extortion, a scheme in which key files on the system's hard drive are encrypted and thus rendered inaccessible to the user unless and until that user pays a ransom to obtain a key for decrypting the files.

The CryptoLocker worm is generally spread via drive-by downloads or as an attachment to phony e-mails disguised as legitimate messages from various business, such as fake FedEx and UPS tracking notifications. When a user opens such a message, CryptoLocker installs itself on the user's system, scans the hard drive, and encrypts certain file types, such as images, documents and spreadsheets. CryptoLocker then launches a window displaying a demand for ransom (to be paid in less-traceable forms such as Bitcoins and Green Dot Moneypaks) and a countdown timer showing the date and time before which the user must submit payment in order to obtain the decryption key before it is destroyed:

According to various accounts, users whose computers have been infected by CryptoLocker have been able to restore their files by paying the demanded ransom (usually $300 to be paid within 72 hours), and computer security companies haven't yet come up with a solid defense against the CryptoLocker malware:
If the ransom is paid before the deadline, a key is given to decrypt the files. If not, the key is destroyed and the files are effectively lost forever. Even advanced software security companies don't really have ways to restore the locked hard drive. Catching the hackers behind CryptoLocker may be the only way to retrieve the files.

The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.

Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
As the Guardian noted of CryptoLocker and its victims:
"If you haven't got a backup and you get hit by CryptoLocker, you may as well have dropped your PC over the side of a bridge," says Paul Ducklin, security adviser for anti-virus software company Sophos. Even if you had backed up your files, he says, if your back-up device was connected to your computer when CryptoLocker struck, you may not be able to recover them. Similarly, all the files in shared network drives that were connected at the time of the attack could also become encrypted and inaccessible.

CryptoLocker currently only affects PCs and can easily be removed with anti-virus software, but its effects cannot. "I don't think anyone in the world could break the encryption," says Gavin O'Gorman, spokesman for internet security firm Symantec. "It has held up for more than 30 years."


So should anyone hit by CryptoLocker pay up? "You'd be in the same situation if your laptop got stolen — it just feels worse because you know that there is someone out there who has got this key. If your data is worth $300 to you, it must be very tempting to pay up, just in case it works," Ducklin says.

According to Symantec, around 3% of people hand over money in the hope of getting their data back. "But remember, you're dealing with criminals," Rubin says. "There is no guarantee they'll send you the key, and if they know you're susceptible to blackmail what is to stop them from doing it again?"

Bear in mind that every penny you pay them will fund their endeavors to target other victims. "If even a few victims pay then the cybercriminals will think they have got a viable business model and keep infecting people and asking for ransoms. If nobody pays, they will stop these campaigns," says Dmitri Bestuzhev, spokesperson for Kaspersky anti-virus software

Read more at snopes.com: CryptoLocker
__________________
Mark & Linnae
Birmingham, The U.P., Saginaw, Bay City, Toledo, Columbus, Dayton
& The Village of Chatham

"I wish I didn't know now, what I didn't know then"
-Bob Seger-

Last edited by Kahuna32162; 06-20-2014 at 12:40 PM.
  #3  
Old 06-20-2014, 12:25 PM
DonH57's Avatar
DonH57 DonH57 is offline
Sage
Join Date: Mar 2011
Location: Village Santo Domingo.
Posts: 3,949
Thanks: 1
Thanked 618 Times in 318 Posts
Send a message via AIM to DonH57
Default

We've had prior experience with the cryptolocker virus.
  #4  
Old 06-20-2014, 12:36 PM
Kahuna32162's Avatar
Kahuna32162 Kahuna32162 is offline
Gold member
Join Date: Jul 2013
Posts: 1,244
Thanks: 109
Thanked 402 Times in 161 Posts
Default

I think it's always wise to REGULARLY back up all your documents, pictures, music and any other files that you would not want to lose. A portable USB hard Drive or even a large capacity thumb drive is well worth the cost. a 500 GB USB Hard Drive will run you about $50 on Amazon.
__________________
Mark & Linnae
Birmingham, The U.P., Saginaw, Bay City, Toledo, Columbus, Dayton
& The Village of Chatham

"I wish I didn't know now, what I didn't know then"
-Bob Seger-
  #5  
Old 06-20-2014, 12:40 PM
Microcodeboy Microcodeboy is offline
Senior Member
Join Date: Jul 2013
Posts: 107
Thanks: 0
Thanked 18 Times in 4 Posts
Default

Never click on a link in an email. Never.
Never open an attachment that you are not specifically expecting. Never.
__________________
The real joy of knowledge is in sharing.
  #6  
Old 06-20-2014, 05:56 PM
EnglishJW's Avatar
EnglishJW EnglishJW is offline
Veteran member
Join Date: Mar 2014
Location: The Villages
Posts: 614
Thanks: 436
Thanked 100 Times in 37 Posts
Default

Quote:
Originally Posted by Kahuna32162 View Post
I think it's always wise to REGULARLY back up all your documents, pictures, music and any other files that you would not want to lose. A portable USB hard Drive or even a large capacity thumb drive is well worth the cost. a 500 GB USB Hard Drive will run you about $50 on Amazon.
I completely agree. This is something everyone should be doing regularly.
__________________
Garden Staters
  #7  
Old 06-20-2014, 06:36 PM
Halibut Halibut is offline
Veteran member
Join Date: Jul 2013
Posts: 500
Thanks: 18
Thanked 58 Times in 24 Posts
Default

Sigh. I do back up weekly, but it's to my network cloud drive. I never considered that it might also be vulnerable.

I've received several of those purported package delivery emails recently but they were obvious phishing and I deleted. At what point will simply getting the message in our inboxes be enough to propagate a virus?
Closed Thread


You are viewing a new design of the TOTV site. Click here to revert to the old version.

All times are GMT -5. The time now is 12:57 PM.