1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

Cryptolocker Virus Question

Discussion in 'General Malware And Security' started by Rich M, Sep 24, 2014.

  1. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    Just curious if anyone has ever tried using any Linux live cds to try to read Crypto Locker encrypted files?
     
  2. allheart55 (Cindy E)

    allheart55 (Cindy E) Administrator Administrator

    Joined:
    Jun 11, 2009
    Messages:
    10,620
    Location:
    Pennsylvania
    Operating System:
    Windows 10
    Computer Brand or Motherboard:
    ASUS M4A77TD AM3 AMD 770 ATX AMD
    CPU:
    AMD Phenom II X6 1090T-Thuban 3.2GHz
    Memory:
    Crucial-DDR3 SDRAM 1333-8GB
    Hard Drive:
    WD Caviar Black SE HDD 640 GB - WD Caviar Black SE HDD 500 GB
    Graphics Card:
    Sapphire Radeon HD-7870 2GB
    Power Supply:
    CORSAIR CMPSU-750W
    I haven't, have you?
     
  3. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    I got an answer from Ken Dwight, the Virus Doctor on Linkedin who said it has been tried many times and encryption trumps the operating system.
     
  4. Match

    Match Registered Members

    Joined:
    Apr 23, 2009
    Messages:
    4,175
    Location:
    Wolverhampton, UK.
    Computer Brand or Motherboard:
    Abit AN52
    CPU:
    AMD Athlon dual core 5000+
    Memory:
    4 Gig Corsair
    Hard Drive:
    160 Gb Hitachi 500 Gb Western Digital
    Graphics Card:
    Radion XFX 4650
    Power Supply:
    550W EZcool
    Trouble I see is that Linux will probably open or access the data but without the 'key' all your going to see is garbled junk.
     
    Tony D likes this.
  5. Tony D

    Tony D Administrator Administrator

    Joined:
    Sep 25, 2009
    Messages:
    5,157
    Location:
    SE Pennsylvania, USA
    Operating System:
    Windows XP Professional
    Yup - you need the private key to decypher the files.
     
  6. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    All true I now know.
     
  7. Plastic Nev

    Plastic Nev SUPER MODERATOR IN MEMORY

    Joined:
    May 2, 2009
    Messages:
    2,801
    Location:
    In front of a monitor in Blackburn Lanc's UK.
    Operating System:
    Windows 7
    It now depends on which cryptolocker version, if the original I think the FBI sorted them out and then made the unlocking keys public and free. If one of the later versions, you are stuck till they get smashed by the authorities.

    However we are back to the advice given out when this thing first started, make backups regularly and keep them disconnected when not actually backing stuff up.
    Unfortunately that advice gets ignored till that horrible thing gets into your computer, and by that time it is too late.
     
    allheart55 (Cindy E) likes this.
  8. Match

    Match Registered Members

    Joined:
    Apr 23, 2009
    Messages:
    4,175
    Location:
    Wolverhampton, UK.
    Computer Brand or Motherboard:
    Abit AN52
    CPU:
    AMD Athlon dual core 5000+
    Memory:
    4 Gig Corsair
    Hard Drive:
    160 Gb Hitachi 500 Gb Western Digital
    Graphics Card:
    Radion XFX 4650
    Power Supply:
    550W EZcool
    Seems there is a link between 5½ inch floppy drives and people who understand the importance of backing up files.
     
  9. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    Well here is the complete update about CryptoLocker as we have passed the first year in existance now and there is still no end in sight...reprinted with permission from virus expert Ken Dwight recently posted at the Linkedin Forum:
    "
    · upload_2014-9-27_11-30-11.png

    Ken Dwight

    Owner, The Virus Doctor

    "Thanks for the vote of confidence, Jim! Having said that, I need to correct a statement you made. Nobody has "figured out" CryptoLocker. As a result of some fortuitous circumstances, combined with some fine detective work, two anti-virus vendors gained access to some of the servers that had been used by the producers of CryptoLocker. Those servers contained the private encryption keys that were required in order to decrypt the encrypted files.

    Using those keys, it was possible to decrypt some of the files that had been encrypted by the original CryptoLocker. But not because anybody "figured it out," or came up with a silver bullet to recreate those keys. For all practical purposes, those keys are uncrackable.

    And bear in mind, we're still in the first generation of encrypting ransomware. This form of criminal activity first showed up more than 10 years ago, but it was not widely distributed and used a fairly simplistic approach to encryption. Those infections left the encryption key on the affected computer, making it possible, if not easy, for a competent tech to find the key and decrypt the files. I'll refer to this as Version 1.0 in this family.

    When CryptoLocker first surfaced, just one year ago this month, it was a game changer. It followed best practices in encryption, using a combination of a public key on the affected computer and a private key on the CryptoLocker servers. And they used (or claimed to use) 2048-bit encryption, orders of magnitude beyond the 128-bit encryption that was considered to be the gold standard just a few years ago. Again, uncrackable. And it was very widely distributed, becoming one of the most widespread pieces of malware in recent memory. All things considered, this was a big enough step up from Version 1.0 that I'll call it 1.5.

    With the success of CryptoLocker came the imitators -- at least 7 of them, at last count. And some of them are being sold worldwide in exploit kits. So, for a few thousand dollars, you can have your own CryptoLocker knockoff. Most of them follow the same general approach, so I'll keep all of them at Version 1.5.

    Then, in July, 2014 CTB Locker (aka Critroni) showed up. It has been described by Fedor Sinitisyn, a blogger and security researcher for Kaspersky, as second-generation ransomware. He lists 5 reasons that he believes it deserves that designation, reprinted in a blog post by Stu Sjouwerman, founder of KnowBe4. Here is a link to that post:http://blog.knowbe4.com/bid/392887/Heads-Up-Second-Generation-Ransomware-In-The-Wild.

    I already have some ideas of what encrypting ransomware Version 3.0 and possibly 4.0 could look like, but won't share those ideas here for obvious reasons. But even if we stay at the current level of sophistication for a few more years (which I consider unlikely), there is still a lot of room for them to get much worse.

    While most of these strains of encrypting ransomware to date have targeted home and small-business users, with ransom demands in the hundreds of dollars, there is much speculation in the Internet Security industry that the threats will ramp up to target major corporations and demand ransom in the hundreds of thousands or even millions of dollars.

    Considering the recent high-profile hacks of Target, JP Morgan Chase, Home Depot, and many others, who can doubt the vulnerability of such organizations?"
     

Share This Page