![]() |
Cryptolocker: How To Avoid It, What To Do If You Get It
This question came up in a thread I started this week, Hacked By Ransomware although "ransomware" and Cryptolocker are different.
Ransomware prevents you from using your computer unless you pay. But since the files are still intact, it may be possible to retrieve them. About Cryptolocker, USA Today said: This diabolically nasty malware locks up all of the victim’s personal files — and in some cases, backup files, too — with state-of-the-art encryption. The bad guys have the only decryption key and they demand $300 or two Bitcoins to get it. How do you become infected with CryptoLocker This infection is typically spread through emails sent to company email addresses that pretend to be customer support related issues from Fedex, UPS, DHS, etc. These emails would contain a zip attachment that when opened would infect the computer. These zip files contain executables that are disguised as PDF files as they have a PDF icon and are typically named something like FORM_101513.exe or FORM_101513.pdf.exe. Since Microsoft does not show extensions by default, they look like normal PDF files and people open them. It is my hope that this thread can serve as a repository of information until this malicious piece of malware is eradicated. Editorial note: I'd like the people running this scam rounded up and sent to GITMO, but that's just me. |
Originally Posted by Landing Gear
(Post 21837263)
I'd like the people running this scam rounded up and sent to GITMO, but that's just me.
I'm sure that there are suitable prisons in other countries that would be far more appropriate (far less humane). |
Once your files have been encrypted, your only choice is to either pay for the key or wipe your computer and files.
This is why I'm happy most criminals are dumb: smart ones are bad news for everybody. |
Originally Posted by Landing Gear
(Post 21837263)
Editorial note: I'd like the people running this scam rounded up and sent to GITMO, but that's just me.
|
This infection is typically spread through emails sent to company email addresses that pretend to be customer support related issues from Fedex, UPS, DHS, etc. These emails would contain a zip attachment that when opened would infect the computer. These zip files contain executables that are disguised as PDF files as they have a PDF icon and are typically named something like FORM_101513.exe or FORM_101513.pdf.exe. Since Microsoft does not show extensions by default, they look like normal PDF files and people open them. Another reason to ditch Outlook, OP. |
Outlook shows file extension names.
Here it is a .zip file. You can see that, but when you open the .zip file, you can't see the extension of the compressed file. That has nothing to do with Outlook. |
Q: Cryptolocker: What To Do If You Get It
A: Restore your backup from last night. |
Originally Posted by Landing Gear
(Post 21837263)
Editorial note: I'd like the people running this scam rounded up and sent to GITMO, but that's just me.
Originally Posted by cheltzel
(Post 21838252)
Why so nice?
I'm sure that there are suitable prisons in other countries that would be far more appropriate (far less humane).
Originally Posted by Loren Pechtel
(Post 21840189)
Gitmo is far too nice for them.
Originally Posted by nerd
(Post 21840650)
Doesn't this depend on whether your email client (whether it's desktop-based or browser-based) shows extensions? Or are they saying that Microsoft Outlook doesn't show extensions?
Another reason to ditch Outlook, OP.
Originally Posted by Always Flyin
(Post 21841183)
Outlook shows file extension names.
Here it is a .zip file. You can see that, but when you open the .zip file, you can't see the extension of the compressed file. That has nothing to do with Outlook.
Originally Posted by ScottC
(Post 21841972)
Q: Cryptolocker: What To Do If You Get It
A: Restore your backup from last night. |
Originally Posted by Landing Gear
(Post 21842229)
Because of course, everyone has a daily backup, since making daily backups can be done very easily without spending much money on hardware and software. What planet are you living on? :)
The hardware is typically one external drive, cost between $70-$300 (at the higher end, it's a basic single-drive NAS; at the lower end, it's just USB.) On a desktop, it's trivial; just schedule it, and leave it on overnight. On a laptop, remembering to power it back up, and either connecting the drive or connecting it to a wired network (unless your volume of new files is quite low, in which case wireless might work) is tougher, but more in terms of habit vs. automation than actual practicalities. On the road, it's much tougher. OTOH, images say, monthly, and then using dropbox or similar for your most critical documents day to day will cover most of it. Still not easy, but it's mostly a matter of habit and time rather than software or hardware. |
If the Cryptolocker guys or gals and those behind the other ransomware see this, they may well delay the programme actually locking you out until they're made certain your backups are also infected (assuming the payload can avoid detection).
|
Originally Posted by YVR Cockroach
(Post 21843027)
If the Cryptolocker guys or gals and those behind the other ransomware see this, they may well delay the programme actually locking you out until they're made certain your backups are also infected (assuming the payload can avoid detection).
From my personal experience, you really need to review your anti-malware and internet security software with some frequency. Look at the reviews, compare features, etc. There are some very good free products available (Avast and AVG come to mind first). Both integrate very tightly with your browser and with something like Outlook (if you use Outlook). There are also some good personal firewall products. I try to stay behind a firewall appliance when possible. It is a shame but you really have to assume that you are perpetually in a hostile environment. |
Originally Posted by ScottC
(Post 21841972)
Q: Cryptolocker: What To Do If You Get It
A: Restore your backup from last night.
Originally Posted by Landing Gear
(Post 21842229)
Because of course, everyone has a daily backup, since making daily backups can be done very easily without spending much money on hardware and software. What planet are you living on? :)
2TB USB desktop and portable backup solutions, including automated backup software, are available for less than $100. The Seagate Backup Plus family of products is just one example. The cost is minimal. The initiative and discipline to perform daily backups is priceless. |
I am using Crashplan. And there's a spare T420 laptop in the bedroom closet. I use Linux but that's beyond the question -- if anything happens to this laptop, hacked, stolen, broken, burns down in a fire, I can be back on where I was within the few hours it takes for Crashplan to download files.
|
Originally Posted by cheltzel
(Post 21844041)
If I read Landing Gear's original thread correctly, the AV product used was a free version of McAfee. IMO, there are much better products than McAfee.
Here is what I have been using at $35 a machine per year, McAfee SaaS Endpoint Protection.
Originally Posted by cheltzel
(Post 21844041)
From my personal experience, you really need to review your anti-malware and internet security software with some frequency. Look at the reviews, compare features, etc. [QUOTE=WWGuy;21844848] Actually many of us enlightened Earthlings do perform daily backups to avoid unexpected data loss. drives/standard/backup-plus/"]Seagate Backup Plus[/URL] family of products is just one example. The cost is minimal. The initiative and discipline to perform daily backups is 2TB USB desktop and portable backup solutions, including automated backup software, are available for less than $100. The [URL="http://www.seagate.com/external-hard-drives/portable-hard-priceless. [/QUOTE] But let's face reality. Many people are almost glued to their laptops all day long. Full backups take hours. When you are done with your laptop, late at night (since you know you will not be able to use it until the next morning), many people are too tired to plug in a drive and start things up. |
Originally Posted by Landing Gear
(Post 21845625)
But let's face reality. Many people are almost glued to their laptops all day long. Full backups take hours. When you are done with your laptop, late at night (since you know you will not be able to use it until the next morning), many people are too tired to plug in a drive and start things up.
Oh, and c) Being VERY suspicious of files of the type mentioned as the ones used by the encrypter clowns. |
| All times are GMT -6. The time now is 11:28 am. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.