1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

Can CryptoWall 2.0 disable boot?

Discussion in 'General Malware And Security' started by Tony D, Nov 17, 2014.

  1. Tony D

    Tony D Administrator Administrator

    Joined:
    Sep 25, 2009
    Messages:
    5,157
    Location:
    SE Pennsylvania, USA
    Operating System:
    Windows XP Professional
    I'm working on a W7 Home Premium machine that won't boot. It gets past POST and then the screen just kinda flickers. It flashes like it's going to going to load Windows, then goes back to black screen and repeats.

    When I connected the hard drive to another computer to recover files, I saw that it was hit by CryptoWall 2.0. The users didn't mention this. There weren't many files on the computer. I couldn't open the photos. I assume she just ignored the warnings to decrypt her files.

    To get it to boot, I tried System Restore - there were no restore points. I tried Startup repair. That was no help. I tried replacing the regisry: Default, San, Security, Software, and System files. No joy there either.

    When trying to boot to the recovery partition, I just got the blinking underscore at the top left corner of the screen. The recovery files were definately on the recovery partition. I did note that CryptoWall left instruction on how to recover files on that partition also.

    I thought CryptoWall only encrypts user files. Is it possible that if the user doesn't pay within a certain time period, that CryptoWall then goes to the registry and recovery partition to disable the computer from booting?
     
  2. allheart55 (Cindy E)

    allheart55 (Cindy E) Administrator Administrator

    Joined:
    Jun 11, 2009
    Messages:
    10,620
    Location:
    Pennsylvania
    Operating System:
    Windows 10
    Computer Brand or Motherboard:
    ASUS M4A77TD AM3 AMD 770 ATX AMD
    CPU:
    AMD Phenom II X6 1090T-Thuban 3.2GHz
    Memory:
    Crucial-DDR3 SDRAM 1333-8GB
    Hard Drive:
    WD Caviar Black SE HDD 640 GB - WD Caviar Black SE HDD 500 GB
    Graphics Card:
    Sapphire Radeon HD-7870 2GB
    Power Supply:
    CORSAIR CMPSU-750W
  3. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    Hi Tony,

    Sorry for the delay.

    CryptoWall 2.0 is the newer version.
    I haven't seen anything about disabling Boot ...... but there's no telling, if it did it may not be intentional.
    After all ..... if you can't Boot the system, you can't pay the ransom.

    In October 2014 the malware developers released this latest version, which resolved some problems in the original version.
    These changes include developer run Web-to-TOR gateways, unique bitcoin addresses for each victim, and secure deletion of original unencrypted files.

    These new changes make it better for the malware developer and harder for a victim to recover their files for free.
    CryptoWall will now securely delete your original data files. Originally, CryptoWall would encrypt your data files and then just delete the original. It would then be possible to use data recovery tools to try and recover your data. Now that CryptoWall is securely deleting your data, this method will no longer work and you will need to restore from backups or pay the ransom.

    Unfortunately at this time there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom on the CryptoWall Decryption Service. Brute forcing the decryption key is not realistic due to the length of time required to break an RSA encryption key. Also any decryption tools that have been released by various companies will not work with this infection. The only methods you have of restoring your files is from a backup, file recovery tools, or if your lucky from Shadow Volume Copies.

    Updated CryptoWall 2.0 ransomware released that makes it harder to recover files
     
  4. Tony D

    Tony D Administrator Administrator

    Joined:
    Sep 25, 2009
    Messages:
    5,157
    Location:
    SE Pennsylvania, USA
    Operating System:
    Windows XP Professional
    Thanks Starbuck, Maybe it's just a coincidence. The user was hit with CryptoWall on Nov 11. He didn't pay any attention to it. Then about 2 weeks later, his computer wouldn't boot. Additionally, I couldn't recover using the recovery partition. I was wondering if CryptoWall had some kind of timebomb whereas if the user didn't pay for the recovery after some period of time, it continued to encrypt system files. That would prevent the computer to boot in addition to messing with the recovery partition files.
     
  5. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    From what i've read..........
    With CryptoWall, the ransom starts at $500. You have 24 hours to pay that ransom. If you don’t pay it, then the ransom goes up to $1000 and you have another 24 hours to pay that. If you don’t pay it, the ransom goes up to $1500 and you have yet another 24 hours to pay it. If you don’t, the decryption key is destroyed and there is no way to decrypt your files.

    It's not the system files they go after.... it's the personal files/folders.

    2 weeks seems quite a long time.
    CryptoWall isn't that difficult to get rid of.... most security programs can deal with it now.
    It's the encrypting of the files/folders that's the big problem.... there's no third party program that can decrypt them.
     
  6. Tony D

    Tony D Administrator Administrator

    Joined:
    Sep 25, 2009
    Messages:
    5,157
    Location:
    SE Pennsylvania, USA
    Operating System:
    Windows XP Professional
    Thanks again Pete. Must have been coincidents.
     
  7. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    Tony I would believe it is coincidence because once again if their goal is to collect a ransom, they need the pc to at least boot enough to give the user the information.
    BTW one thing that I am now certain of is that Emsisoft prevents this whole problem and I just became a reseller. Tony the deal is incredible to make money on and where you belong to the LinkedIn group I do you can get an even better price. Please call me or email me if interested as I am done with Malwarebytes since it does not prevent this incursion. You can make over 100% on this legitimately as a reseller my friends.
     
  8. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    Now that's a sale pitch if ever i heard one. :)
     
  9. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    Just excited Pete I make nothing on this if anyone wants to rep it...but it's the best deal I have ever seen for reselling software.
     
  10. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
  11. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    Guess there are no "money hungrys" here as no one even asked!
     

Share This Page