Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

steve2470

(37,457 posts)
Mon Nov 9, 2015, 02:43 AM Nov 2015

Warning to all computer users: "Cryptowall 4.0: Update makes world's worst ransomware worse still"

I usually don't post alarm-ish warnings in GD, but I think this kinda deserves one. Please keep this kicked.

cross post from CHaS:

http://www.democraticunderground.com/109516043

http://www.theregister.co.uk/2015/11/09/cryptowall_40/

The fourth iteration of the world's worst ransomware Cryptowall has surfaced with gnarlier encryption tactics and better evasion tricks that have fooled current antivirus platforms.

Ransomware has ripped through scores of businesses and end-user machines in sporadic and targeted attacks that have cost victims millions of dollars in ransom payments made to criminals who have illegally encrypted valuable files.

The worst offenders remain at large including a single group who may be behind Cryptowall 3.0 and have made some US$325 million this year according to the Cyber Threat Alliance, dwarfing FBI June figures which noted it extorted some US$18 million from US victims alone in about a year.

Andra Zaharia of Denmark-based Heimdal Security says Cryptowall 4.0 is employing "vastly improved" communications and better code, so it can exloit more vulnerabilities.

more at link

6 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Warning to all computer users: "Cryptowall 4.0: Update makes world's worst ransomware worse still" (Original Post) steve2470 Nov 2015 OP
bump cuz important nt steve2470 Nov 2015 #1
What are best practices for dealing with this threat? Jim Lane Nov 2015 #2
my understanding is that ransomware gets into computers via "social engineering" methods... steve2470 Nov 2015 #3
Off site backups are a good way of protecting yourself Egnever Nov 2015 #5
I'm doing that but apparently it's not enough Jim Lane Nov 2015 #6
my company sent this e-mail around last week... we were hit Takket Nov 2015 #4
 

Jim Lane

(11,175 posts)
2. What are best practices for dealing with this threat?
Mon Nov 9, 2015, 12:20 PM
Nov 2015

Thanks for the warning!

I assume there are steps one can take to reduce the danger of infection, and also methods of backing up that are more likely to survive the attack. If security people have any practical advice, I'd love to read it.

steve2470

(37,457 posts)
3. my understanding is that ransomware gets into computers via "social engineering" methods...
Mon Nov 9, 2015, 01:47 PM
Nov 2015

Social engineering means an email comes into an office or home and someone downloads an attachment or clicks a lick in the email, and gets infected with the ransomware. So, the first step is for everyone to be extremely cautious about attachments, links and just emails in general. I don't know if the ransomware is transmitted via USB sticks and other methods.

The rest of the cybersecurity steps, I'm not so sure about. That's where the IT people on the board will have to step in.

 

Egnever

(21,506 posts)
5. Off site backups are a good way of protecting yourself
Mon Nov 9, 2015, 02:09 PM
Nov 2015

Carbonite, crashplan, or mozy are a few that come to mind.

If your files are backed up correctly this would only be an inconvenience.

 

Jim Lane

(11,175 posts)
6. I'm doing that but apparently it's not enough
Mon Nov 9, 2015, 02:25 PM
Nov 2015

I looked into Carbonite and Mozy but ended up choosing SugarSync. I no longer remember why, but I've been very pleased with it -- automatic backup whenever I change a file so no need for me to do anything, and I can retrieve my backed-up files quite easily from any computer with internet access. The one time I had some sort of issue, because of a misunderstanding on my part, I phoned and reached an actual human being who solved my problem.

OK, end of unsolicited testimonial for SugarSync, and back to ransomware -- as I understand it, one issue is that if you get infected and then there's an automatic backup, the infection can spread to your offsite backup. My impression (speaking as a nontechnical person) is that even using one of these offsite backup services might not fully protect you.

Takket

(21,571 posts)
4. my company sent this e-mail around last week... we were hit
Mon Nov 9, 2015, 01:51 PM
Nov 2015

company name removed for privacy....

In recent months, we have had multiple incidents where a computer within *** was infected by a type of virus commonly referred to as ‘Ransomware’. These infections entered our environment disguised as a Word resume attached to an email, or as a .ZIP file. The email appeared very normal but once the attachment was opened and trusted, it launched a process that once fully deployed, reached out to our file servers and started to lock all data files and make them unusable.

In light of this, we have put in place some additional security precautions on our network to help block these types of malware from entering. It should be noted that these steps cannot fully protect our environment, and each user has a responsibility to think and act carefully.

Incoming email from external sources is now being more thoroughly scanned. When an email has an attachment that is high risk (e.g. executable, script file, or suspicious attachment name), the email is not delivered to the *** recipient.

We are also scanning the contents of ZIP file attachments and will block ZIP files containing scripts or executables. ZIP files containing PDF’s, drawings, Office documents and other business related content will not be blocked.

Staff are still requested to be cautious of any emails received and DO NOT open any attachments if you are not sure who the sender is. Microsoft Word has an additional ‘Protected View’ that opens the Word attachment in a safe ‘read-only’ mode.

Be very careful when ‘trusting’ a document and turning off the ‘Protected View’. Make sure the document looks legitimate and relates to the email subject and body. As an example, if the name on the resume does not correspond to the email sender, you should be very suspicious.

Computer hackers are very creative. A recent strain of malware came into our organization with the subject line of ‘RESUME’ and with an actual resume in Microsoft Word format attached to the email. Once the attached Word file was opened and ‘Protected View’ was turned off, it ran the ransomware process that started to lock data files starting from the local machine and then spreading out to the connected file servers. The only way to recover locked data files was to restore from a previous backup.

Starting this week, we will be disabling the ability to automatically launch a ZIP attachment from inside Outlook. If you ‘double click’ to open a ZIP file from within Outlook, you will receive the following warning with instructions to be careful and save the file to disk if you trust the contents of the ZIP attachment.


In all cases, if you have any doubts on any email or attachment received, DO NOT open it – delete

Latest Discussions»General Discussion»Warning to all computer u...