A New Virus Threat Emerges

By Steve McEvoy, Technology Consultant

steveM

There is a new Virus threat spreading quickly across the Internet currently that is particularly wicked.  It’s called CryptoLocker.    I am writing this because I think there is some chance you could be at risk, either with your home PC or work computers.  We had five people call us infected on the first day the virus was out.  Please take a minute and read through this to the end where I suggest what you can do to help prevent getting infected.

The virus’s design has made it so that even current Antivirus products running in your firewall and antivirus software on your PCs aren’t detecting it until it’s too late, if at all.  The antivirus companies are trying to respond, but the virus ‘morphs’ each time it replicates, so its slippery for them to detect and block or quarantine.

What does it do?
In short, the virus is a form of Ransomware.  Once it gets into your PC, it ‘encrypts’ all your personal files and data, and then holds your data hostage for ransom.  In this case they want $300 to provide you with the unlock code to decrypt your files and remove their application.

To motivate the affected user to quick action, they only give you 72 hours to act, then the data is lost forever.

Its design is such that if your IT person then tries to remove it, this will leave your files encrypted forever.

It gets worse.  If your PC has external media like USB hard drives and USB keys attached, it encrypts those too.  Imagine if your Backup drive was attached, it would be encrypted and unusable to restore your data from before the attack.  Even worse, if your infected PC is connected to a network and you have connections to a Server, it reaches out and encrypts the data on the Server too.   If you use a Cloud based storage like Dropbox or Google Drive, it will encrypt the data within those folders as well.   If you use Internet Backup, the backup will pick up copies of the encrypted files.  A giant mess.

What can you do if it happens to you?
If you get hit by this virus – make a note of the time you have left (in the 72 hours) and then SHUT OFF THE PC entirely!  The longer it remains on, the more time it has to search and encrypt more files.   It might be prudent to disconnect the network cable too if you are connected to an office network. Contact your IT person immediately for their assistance in recovery.

Our experiences so far indicate there is no way to simply clean it and recover like other spyware or viruses.  If you have a backup that is safe somewhere (not connected to the infected PC), this is your best option for recovery, but don’t try to recover data to a machine infected with CryptoLocker, it will just destroy that precious backup.   Backups come in many forms, so I can’t tell you exactly how to best use it, but your IT person can.  Its highly likely that you will need to reinstall Windows to your PC, and then restore your data to this Clean PC (huge hassle).  If your Server’s data got infected, you’ll need to restore that data as well.

Your very, very last option is to pay the ransom.  In most Ransomware attacks, paying the ransom does not unlock your data (why would they?).  We have seen reports that people paying the ransom in this particular case has been unlocking the data as indicated.  You are paying criminals, who will just use that money to do more evil things.  Think hard about this before you consider it.   Might it be better to lose the data you ‘sort of need but could reconstruct’ than to propagate this issue and reward a criminal.

How it’s getting in
I can’t tell you for certain how it’s been getting in (which is troubling).  With its ability to slip through the Antivirus filters it comes down to there is no defense (yet) other than you using your smarts.   Reports to date seem to indicate it gets in using one of two methods:

As an attachment to an email message.  Typically something claiming to be a shipping notice or receipt for your review.  A common lure to get you to try and open the attachment to see what it is, and if you open that attachment the virus sets in.

If your computer is already infected with some mild spyware (pop ups, other nuisances) they have found a way to exploit the Spyware’s communication methods to slip in and get started that way.  This doesn’t need a user’s interaction, and is crazy scary.

To Defend Yourself:
Don’t open attachments that come with emails unless you are 100% certain to the validity of the attached file. Meaning you should know who is sending it to you, why they are sending it, and you should have been expecting it.  Even an emailed attachment from someone you know could be a cleverly disguised virus, so be SURE before you open it.  You can always pick up the phone and contact that person to be sure they sent you something.  YOU CAN’T rely on your antivirus software to defend you at the moment.  You have to use your own smarts and avoid things that will trigger it.

If you suspect that your PC has Spyware in any other way (acting weird, slow, pop-ups) contact your IT person to address this immediately.  When in doubt, turn off the PC until your IT person evaluates it.

Keep your Antivirus program up to date on a daily (or more frequent) basis.   (If you are an MME client running Symantec Endpoint Protection, this happens automatically several times per day without your interaction needed.)

Basically, responsible surfing is the best defense.

I wish I had better news, but I thought I would at least give you a heads up for now.

Please spread the word to others in your office.

If you have any questions or concerns, please let me know.

Take Care,
Steve

_________________________________
Steve McEvoy
MME Consulting, Inc.
4714 Duckhorn Drive
Sacramento, CA  95834-2592
Toll Free: (866) 419-1102 (ext. 2008)
Fax: (916) 419-1103
Email: steve@mmeconsulting.com

2 thoughts on “A New Virus Threat Emerges

  1. Steve, this is an EXCELLENT article, and I appreciate you putting it out there. I have been talking with my customers A LOT about the importance of replacing their old XP machines, the reality of Microsoft dropping support of this operating system, and why Ortho2 has made the decision to no longer support XP machines. I don’t think people realize just how vulnerable this will make their network.

    http://blog.ortho2.com/blog/bid/97463/Windows-XP-Support-Ending-April-2014

  2. I manage several hundred networks, including many Ortho/Dental practices and have yet to see this virus. Internet Filtering is a MUST today (and protects against this threat) just as much as updated virus scan software. As always, teach your staff to be skeptical of any email attachments, even when the appear to come from known senders. Implementing good technology to prevent this and other infections is the first step, user awareness/training is the second step.

Leave a Reply

Your email address will not be published. Required fields are marked *

By submitting this form, you accept the Mollom privacy policy.