Donate!
Welcome, Guest. Please Login or Register :: View Members
Pages: 1
Send Topic Print
Be careful out there: Crytowall ransomware (Read 35 times)
Pine
Serious Thumper
*****
Offline

SuzukiSavage.com
Rocks!

Posts: 1694
Mississippi, USA
Gender: male
Be careful out there: Crytowall ransomware
06/13/14 at 11:32:56
 
All I just got this from our IT dept ( I work in the same IT dept, but not in security)

Please be on your best behavior out in the wilds of the 'net


From:                  The Office of Information Security
Subject:               New Ransomware "CryptoWall" Rapidly Infecting Systems across the United States
Key Points
•      CryptoWall is a new form of ransomware that has impacted numerous organizations across the United States, including municipal agencies.
•      The primary infection vectors for CryptoWall are spear-phishing emails, made to look like communications from legitimate companies, and compromised advertisements displayed on highly trafficked websites.
•      Upon executing on a system CryptoWall immediately begins to encrypt any files the user has access to, including data on shared drives.
•      The damage done to affected files by CryptoWall is irreversible and typically requires restoring locked files from existing back-ups.
•      Currently, while some (but not all) major anti-virus software companies can now detect the attack after-the-fact, CryptoWall can still encrypt files on the infected computer before being discovered.
•      If you believe your computer has been infected with the CryptoWall virus Immediately disconnect your systems from the wireless or wired network and contact The Service Desk at (601)984-1145
Background
CryptoWall is a new ransomware discovered in late April 2014 that affects all versions of Windows. The most common infection vectors for CryptoWall are spear-phishing e-mails with malicious attachments (e.g. PDFs which, when opened, executes CryptoWall) or compromised advertisements on highly trafficked websites, such as news or social media sites.

Upon execution, CryptoWall immediately encrypts all user-accessible files on the local drive and any mapped networks or storage devices. After encrypting the accessible files CryptoWall displays a message giving victims a 100-hour countdown while demanding a payment of approximately $500 in bitcoins in exchange for the decryption key – though this amount has varied according to open source reporting. If the user does not pay within the demanded timeframe, the amount of the ransom increases.
Several CryptoWall spear-phishing e-mails identified to this point have been crafted to look like communications from legitimate companies and requested the user download or open an "EFAX". Other malicious emails may be disguised as notifications sent from UPS or the "Payroll Department". In some cases, the email address of the sender may have been spoofed to appear as if the email is coming from someone within the user's own company and will ask the user to click on a DropBox.com link.
Thus far, the majority of victims are located in the United States, though numerous victims have been affected across multiple sectors. In at least one incident, CryptoWall masqueraded as a program that claims the user needs to decrypt a file before being able to read it. Once the user tries to open the file, CryptoWall replicates itself across multiple locations on the user's machine and demands payment. CryptoWall may also be disguised as legitimate software updates such as (but not limited to) Abode Reader, Flash Player, and Java Runtime Environment updates.
The success of CryptoWall is likely due to the widespread spear-phishing campaign, the effective spear-phishing lures used by the malicious actors, the diversity in infection vectors – including spear-phishing and malicious advertisements, the fact that numerous anti-virus providers still cannot detect CryptoWall, and the rapidity with which CryptoWall activates upon execution and begins causing damage.
It is very likely we will continue to see more ransomware similar to CryptoWall in the near future due to this successful campaign and due to the availability of "off the shelf" malware and exploit kits for sale on underground cybercrime forums.
CryptoWall Lock-Screen from 8 May 2014 Open Source Incident
Files that have executed CryptoWall include the following:
•      A shortcut icon to a web page named "Decrypt Instructions"
•      A file named "DECRYPT_INSTRUCTIONS.html"
•      A file named "DECRYPT_INSTRUCTIONS.txt"
If users see these files on their computer they should be advised to delete them immediately and notify their systems administrator.
The following preventative measures are recommended to protect your organization from a CryptoWall infection:
•      Instruct users not open any files that appear on the desktop with the name "DECRYPT_INSTRUCTIONS"
•      Ensure all employees are aware of the threat and do not open suspicious e-mails or unexpected attachments, including those e-mails requesting the employee "open a Fax" or "EFAX".
•      Instruct end-users to verify the identity of the sender of any attachments, whether through an informal consistency check of the e-mail address and content of the e-mail or formal communication with the sender.


Back to top
 
 
  IP Logged
shorty
Serious Thumper
*****
Offline

be careful out there
gentlemen

Posts: 547
southern NM
Gender: male
Re: Be careful out there: Crytowall ransomware
Reply #1 - 06/13/14 at 12:05:40
 
thanks pine
Back to top
 
 

motorcycles have been my main transport since 1974
  IP Logged
verslagen1
YaBB Moderator
ModSquad
*****
Offline

Where there's a
will, I want to be
in it.

Posts: 28884
L.A. California
Gender: male
Re: Be careful out there: Crytowall ransomware
Reply #2 - 06/13/14 at 12:21:52
 
Thanks for the help desk number...

Quote:
contact The Service Desk at (601)984-1145
Back to top
 
 
WWW   IP Logged
Pine
Serious Thumper
*****
Offline

SuzukiSavage.com
Rocks!

Posts: 1694
Mississippi, USA
Gender: male
Re: Be careful out there: Crytowall ransomware
Reply #3 - 06/13/14 at 13:37:36
 
verslagen1 wrote on 06/13/14 at 12:21:52:
Thanks for the help desk number...

Quote:
contact The Service Desk at (601)984-1145



HAHAHAH give 'em hell

But dont expect too much "help"
Back to top
 
 
  IP Logged
Pages: 1
Send Topic Print


« Home

 
« Home
SuzukiSavage.com
09/23/24 at 10:26:16



General CategoryThe Cafe › Be careful out there: Crytowall ransomware


SuzukiSavage.com » Powered by YaBB 2.2!
YaBB © 2000-2007. All Rights Reserved.