Go Back   IceInSpace > Equipment > Software and Computers
Register FAQ Calendar Today's Posts Search

Reply
 
Thread Tools Rate Thread
  #1  
Old 24-10-2013, 02:20 PM
GeoffW1's Avatar
GeoffW1 (Geoff)
Registered User

GeoffW1 is offline
 
Join Date: Sep 2006
Location: Sydney
Posts: 1,847
Cryptovirus virus - no AV update yet

Hi,

Here's nasty virus to watch out for, very pernicious

http://windowssecrets.com/top-story/...nicious-virus/

(It's a safe link) I'm going to try out the "Local Software Restriction Policies under the Security Settings heading". If I find out anything useful I'll report in

Cheers
Reply With Quote
  #2  
Old 25-10-2013, 09:16 AM
akjudge's Avatar
akjudge (Jim)
Registered User

akjudge is offline
 
Join Date: Dec 2008
Location: Jamestown, USA
Posts: 7
GeoffW1,

Here is a link (safe) to probably the best info on Cryptovirus from bleeping computer:

http://www.bleepingcomputer.com/viru...re-information

Here is another link (safe) for the free software (referred to in the above article) that will prevent the Cryptovirus:

http://www.fooli****.com/vb6-projects/cryptoprevent/

For those who don't know, this virus will encrypt your files, then demand a ransom ($100 to $300) to get a key to de-encrypt them. They give you 96 hours or the files will remain encrypted permanently. No current virus protection program appears able to block it.

Hope this helps,

Jim
Reply With Quote
  #3  
Old 25-10-2013, 09:55 AM
bojan's Avatar
bojan
amateur

bojan is offline
 
Join Date: Jul 2006
Location: Mt Waverley, VIC
Posts: 7,065
Quote:
Originally Posted by akjudge View Post
This link is not complete ??
Reply With Quote
  #4  
Old 25-10-2013, 10:11 AM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,077
Without going to extremes there are a few ways to avoid infection in the first place:

1_ don't open zip files in emails from unknown senders.
2_ make sure you keep your Java platform updated.
3_ watch out for video drivers updates notifications

Also if you have back ups you can get your files back. A disk image should do the trick.
Reply With Quote
  #5  
Old 25-10-2013, 01:17 PM
adman (Adam)
Seriously Amateur

adman is offline
 
Join Date: Sep 2009
Location: Brisbane
Posts: 1,279
Quote:
Originally Posted by multiweb View Post
Also if you have back ups you can get your files back. A disk image should do the trick.
Only if your backup disk is not connected to your PC otherwise it will be encrypted too....
Reply With Quote
  #6  
Old 25-10-2013, 01:26 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,077
Quote:
Originally Posted by adman View Post
Only if your backup disk is not connected to your PC otherwise it will be encrypted too....
Backups should always be external and only connected during back up or retrieval. If you're infected then I don't think it can be cleaned. The only alternative would be to a bare metal restore with a blank drive.
Reply With Quote
  #7  
Old 25-10-2013, 03:40 PM
GeoffW1's Avatar
GeoffW1 (Geoff)
Registered User

GeoffW1 is offline
 
Join Date: Sep 2006
Location: Sydney
Posts: 1,847
See the trouble they cause? Damned pests
Reply With Quote
  #8  
Old 25-10-2013, 04:29 PM
Astro_Bot's Avatar
Astro_Bot
Registered User

Astro_Bot is offline
 
Join Date: Jun 2012
Location: Brisbane
Posts: 1,605
Quote:
Originally Posted by multiweb View Post
Without going to extremes there are a few ways to avoid infection in the first place:
Use Linux!
Reply With Quote
  #9  
Old 25-10-2013, 04:53 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,077
Quote:
Originally Posted by Astro_Bot View Post
Use Linux!
hmm... that's not a solution. That's a punishment.
Reply With Quote
  #10  
Old 26-10-2013, 09:21 AM
Exfso's Avatar
Exfso (Peter)
Registered User

Exfso is offline
 
Join Date: Sep 2006
Location: Adelaide
Posts: 1,699
I have myself one of these, now it will remove the virus, but if your files are encrypted, you are basically stuffed.

http://store.fixmestick.com/fixmestick


I emailed them last night and this was their reply:

The FixMeStick will remove the Cryptolocker virus off your computer if in the case you do accidentally get it. However, if the virus encrypts your files the FixMeStick (or anyone) will not be able to decrypt your files without the key from the author of Cryptlocker. Which means you would have to pay them. I strongly suggest to keep back-ups of your files regularly and also have system restore points. That way if you do get the virus then the FixMeStick will remove it and you will have either a copy of your files or be able to go back to a restore point before you got the virus and still have them.
This is one particularly nasty virus..
Reply With Quote
  #11  
Old 26-10-2013, 10:04 AM
bojan's Avatar
bojan
amateur

bojan is offline
 
Join Date: Jul 2006
Location: Mt Waverley, VIC
Posts: 7,065
Quote:
Originally Posted by Exfso View Post
I have myself one of these, now it will remove the virus, but if your files are encrypted, you are basically stuffed.

http://store.fixmestick.com/fixmestick


I emailed them last night and this was their reply:

The FixMeStick will remove the Cryptolocker virus off your computer if in the case you do accidentally get it. However, if the virus encrypts your files the FixMeStick (or anyone) will not be able to decrypt your files without the key from the author of Cryptlocker. Which means you would have to pay them. I strongly suggest to keep back-ups of your files regularly and also have system restore points. That way if you do get the virus then the FixMeStick will remove it and you will have either a copy of your files or be able to go back to a restore point before you got the virus and still have them.
This is one particularly nasty virus..
If there is a cleansing agent for this nasty, there should also be some sort of vaccine.. or not?
Once half of your files are gone, it's already too late.

More on this:
http://news.techworld.com/security/1...-crypto-virus/
http://www.networkworld.com/news/200...pto-virus.html
Reply With Quote
  #12  
Old 26-10-2013, 12:25 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by bojan View Post
If there is a cleansing agent for this nasty, there should also be some sort of vaccine.. or not?
This malware (it's not a virus) is similar to file encryption programs that people use to ensure privacy of their files. Since the latest version uses strong encryption you need to know the original key to decrypt the data. If the bad guys didn't leave that key lying around on your computer then you're almost certainly out of luck.

The only chances for a "vaccine" are attacking potential weaknesses in the malware. Perhaps the key it uses is predictable, or perhaps the NSA knows how to break RSA encryption and will tell us

Cheers,
Rick.
Reply With Quote
  #13  
Old 26-10-2013, 05:19 PM
Barrykgerdes
Registered User

Barrykgerdes is offline
 
Join Date: Feb 2007
Location: Beaumont Hills NSW
Posts: 2,900
Encrytion of files

Decrypting of encrypted data on a digital storage device relies on being able to read it back un-encrypted.

This places some limitations on how you can scramble the file. eg it will be a standard byte with a start and stop bit (or two) even if these are also encrypted.

The simple method of encryption is to generate a key using one of the key generating algorithms and adding it algebraicly to the unencrypted data stream.

These keys will normally have a finite length so that when the sequence gets to a given point it reverts to the start.

The secret is to know the point on the key that is the start point for the encryption.

This can be found from a plain copy of a file that has been encrypted

If you know the algorithm, decryption without the key involves feeding the key stream to the encrypted data in a set of registers and add them together again.

Step the key forward one bit at a time to the file and when the key is in sync the output will be your decrypted file.

One way we used to sync the two streams was to look for a sequence of 15 start stop bits in the correct place. This also works if the file is double encrypted.

Big Brother has all the gear to decrypt encrypted files so don't think encrypting data on your HDD will save you if you get caught with something you should not have!

Barry
Reply With Quote
  #14  
Old 26-10-2013, 08:11 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Barry,

Start and stop bits are only used on serial data during transmission. They are not stored in data files.

I think you'll find that modern day encryption and cryptanalysis techniques have moved on a little from what you're describing. You won't be breaking a system that uses a unique 2048 bit RSA key pair each time with a plain text attack or a brute force key search.

Cheers,
Rick.
Reply With Quote
  #15  
Old 27-10-2013, 04:33 PM
Barrykgerdes
Registered User

Barrykgerdes is offline
 
Join Date: Feb 2007
Location: Beaumont Hills NSW
Posts: 2,900
Quote:
Originally Posted by RickS View Post
Barry,

Start and stop bits are only used on serial data during transmission. They are not stored in data files.

I think you'll find that modern day encryption and cryptanalysis techniques have moved on a little from what you're describing. You won't be breaking a system that uses a unique 2048 bit RSA key pair each time with a plain text attack or a brute force key search.

Cheers,
Rick.
Yes I would be surprised if they had not. However I did not want to get too far into encryption. The point I was trying to make is that a code that is electronically generated must follow some rule and the key to decryption without a key is to know exactly what has been encoded. A data stream on a HDD does not use start and stop bits on each byte but it does use markers to know where the the data starts and stops.

Barry
Reply With Quote
  #16  
Old 27-10-2013, 04:49 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by Barrykgerdes View Post
Yes I would be surprised if they had not. However I did not want to get too far into encryption. The point I was trying to make is that a code that is electronically generated must follow some rule and the key to decryption without a key is to know exactly what has been encoded. A data stream on a HDD does not use start and stop bits on each byte but it does use markers to know where the the data starts and stops.

Barry
It is true that there are a variety of headers and trailers at the physical disk and the filesystem level which you could consider analogous to start and stop bits but they are irrelevant here. CryptoLocker encrypts at the file level and it's not hard to tell what has been encrypted.

Cheers,
Rick.
Reply With Quote
  #17  
Old 05-11-2013, 01:50 PM
AdrianF's Avatar
AdrianF (Adrian)
Currently Scopeless

AdrianF is offline
 
Join Date: Sep 2007
Location: Moura Qld
Posts: 1,774
Quote:
Originally Posted by multiweb View Post
hmm... that's not a solution. That's a punishment.


Adrian
Reply With Quote
  #18  
Old 05-11-2013, 09:14 PM
hotspur's Avatar
hotspur (Chris)
Registered User

hotspur is offline
 
Join Date: Apr 2009
Location: south east QLD,Australia
Posts: 2,869
Not good.sounds bad.

A lady at a lab said her work friend got it,he apparently had a bad habit off opening everything,and screen went black,said it was federal police,and pay up.

As has been previously mentioned,avoid opening any unknown emails etc.I delete a lot of messages,on the spot,always when I never know the sender.

Good to see IIS putting these threads up,I do not go on other forums of a computer nature
Reply With Quote
  #19  
Old 06-11-2013, 12:50 AM
killswitch's Avatar
killswitch (Edison)
Registered User

killswitch is offline
 
Join Date: Feb 2013
Location: Western Sydney, NSW
Posts: 537
Anyone know where i can find the virus?

The .exe attachment you get on emails is actually just a small trojan downloader which will download Cryptolocker and drop the destructive payload.

I want to sniff out where the trojan downloads cryptolocker and create a DNS loopback on our server.

EDIT: Nevermind, turns out DNS sink-holing attempts have failed. The downloader has a domain generating algorithm which creates and finds 1000 new locations (everyday) to download cryptolocker from. What a nightmare.

Last edited by killswitch; 06-11-2013 at 01:05 AM.
Reply With Quote
  #20  
Old 06-11-2013, 01:43 PM
Poita (Peter)
Registered User

Poita is offline
 
Join Date: Jun 2011
Location: NSW Country
Posts: 3,586
Quote:
Originally Posted by multiweb View Post
Without going to extremes there are a few ways to avoid infection in the first place:

1_ don't open zip files in emails from unknown senders.
2_ make sure you keep your Java platform updated.
3_ watch out for video drivers updates notifications

Also if you have back ups you can get your files back. A disk image should do the trick.
And always right click on any links and check what the address *really* is before opening them.

It is times like this I am glad I'm not running windows though. All other arguments aside, Windows is getting too problematic for any of my critical workflows, we are transitioning to OSX and Linux at work now as well. The security may in theory be as good in Windows as in anything else, but the insane amount of malware/viruses etc. that target the Windows platform make it not viable for us any more. The attached image is the percentage of Operating Systems infected last month, with Windows accounting for 99.93% of infected computers.

This month's AV report makes interesting reading:
http://lavasoft.com/mylavasoft/secur...n-october-2013
Attached Thumbnails
Click for full-size image (Screen Shot 2013-11-06 at 2.07.45 pm.png)
80.1 KB99 views

Last edited by Poita; 06-11-2013 at 02:10 PM. Reason: Fixing mah shpelling.
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 11:07 PM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement