Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cryptolocker ransomware has ´infected about 250,000 PCs´
BBC News ^ | 12/25/13 | Leo Kelion

Posted on 12/25/2013 6:51:56 PM PST by Nachum

A virulent form of ransomware has now infected about quarter of a million Windows computers, according to a report by security researchers. Cryptolocker scrambles users´ data and then demands a fee to unencrypt it alongside a countdown clock. Dell Secureworks said that the US and UK had been worst affected. It added that the cyber-criminals responsible were now targeting home internet users after initially focusing on professionals. The firm has provided a list of net domains that it suspects have been used to spread the code, but warned that more are being generated every day. Ransomware has existed since at least 1989,

(Excerpt) Read more at bbc.co.uk ...


TOPICS: News/Current Events
KEYWORDS: criminalconspiracy; cryptolocker; dsj02; hackers; infected; pcs; ransom; ransomware
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-134 next last
To: Spirit of Liberty

A freeper on this thread explained how he got out of it in a comment, it had to do with restarting his computer in safe mode.

I had a problem on my last computer with the flash player plug in to IE browser.

It caused Norton to issue a ‘Norton intercepted and deleted a dangerous Trojan virus file’ alert popup every time I went to a new address with IE. Even my home page triggered it.

It was very frustrating and took a while for me to figure out what was causing it. I did the safe mode reboot for that.


101 posted on 12/26/2013 5:49:33 PM PST by sickoflibs (Obama : 'If you like your Doctor you can keep him, PERIOD! Don't believe the GOPs warnings')
[ Post Reply | Private Reply | To 100 | View Replies]

To: sickoflibs; Spirit of Liberty

One method of tackling the problem is to bott into Safe Mode, restore to an uncontaminated Safe Point, reboot, and then use Malwarebytes and/or other malware removal tools to cleanup the malware. Unfortunately, some variants of Ransomware hide on the computer’s hard drive and/or BIOS/EUFI and restores itself after the cleanup, so when you go to boot the computer the next time or some later time the ransomware disables the computer even more by disabling Safe Mode. The computer either goes into a full boot and presents the ransomware message, or the computer cannot be booted into the operating system.

The next step is to use the BIOS setup utilities or another computer that can deal with malware infections to reformat the hard drive and reinstall the operating system. This will often remove the malware for awhile. However, in some instances the ransomware even managed to restore itself immediately after the hard drive had been reformatted and the operating system was reinstalled. Presumably, it did so by hiding enough code on a hidden sector of the hard drive not affected by the reformatting or in the system BIOS/EUFI to bootstrap itself back into the reinstalled operating system. The next attempt to remove this ransomware on these systems resulted in the ransomware blocking any and all efforts to bott the computer at all, whether it was to a full boot, boot to Safe Mode, or a boot to the system BIOS/EUFI.

The next step which has not yet been attempted is to use another used hard drive I can afford to lose and install it as a new hard drive on one of the affected computers. If the ransomware was hidden on an inaccessable area of the original hard drive, replacing the hard drive should be effective in removing the ransomware. However, if the ransomware is hidden in a corrupted BIOS/EUFI, I can expect to see the ransomware infect the replacement hard drive as well and hijack the operating system again, if it will allow the boot process to get even that far.

Your computer is probably repairable by reformatting the hard drive or at least by replacing the hard drive. But don’t be too surprised if you should be unlucky enough to have encountered one of the more vicious and persistent of the ransomware variants. In the worst case scenario with an infection of the BIOS/EUFI, you’ll have to find a means of restoring an uninfected BIOS/EUFI or abandon the ssytem board.


102 posted on 12/27/2013 6:49:20 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 101 | View Replies]

To: zeugma; miliantnutcase; NullPointerException; Utilizer; driftdiver

I just had a converstaion last night with a manager of a college computer science laboratory. he reports that their Linux and Apple systems were successfully attacked by the Cryptolocker ransomware. They restored their systems with backup images of the operating systems and with backups of the data files.

This Linux and Apple vulnerability to Cryptolocker is confirmed by search engine results, which include reports from a number of other college or university computer labs.

Some of these reports appear to claim Cryptolocker requires the user to open an infected file attachment in order to activated Cryptolocker. Such claims appear to be erroneous, because Cryptolocker seems to be infecting computers without the user having anything to do with e-mail and e-mail file attachments.


103 posted on 12/29/2013 5:47:32 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 83 | View Replies]

To: WhiskeyX

Do they have file shares in common? I’ve read that it will seek out those from infected computers.


104 posted on 12/29/2013 5:57:46 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 103 | View Replies]

To: zeugma

Nobody using Wine now, we all Virtual Boxing.


105 posted on 12/29/2013 6:00:28 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 83 | View Replies]

To: WhiskeyX
This Linux and Apple vulnerability to Cryptolocker is confirmed by search engine results, which include reports from a number of other college or university computer labs.

Just did such a search and did not find this to be true. Also CERT claims systems affected are "Microsoft Windows systems running Windows 8, Windows 7, Vista, and XP operating systems."

106 posted on 12/29/2013 6:15:29 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 103 | View Replies]

To: WhiskeyX

You cannot install software on a Linux box without entering the root password.


107 posted on 12/29/2013 6:18:35 AM PST by AppyPappy (Obama: What did I not know and when did I not know it?)
[ Post Reply | Private Reply | To 103 | View Replies]

To: WhiskeyX

How does it infect without the user giving it sudo access?


108 posted on 12/29/2013 6:24:29 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 103 | View Replies]

To: WhiskeyX
Best writup on Cryptolocker I've found is at BleepingComputer.
109 posted on 12/29/2013 6:29:30 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 103 | View Replies]

To: WhiskeyX

It hides in the boot sector which usually isn’t reformatted unless you do it using 3rd party tools. You’d probably have to run like a fdisk /mbr to clean it the old fashioned way.


110 posted on 12/29/2013 6:32:11 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 102 | View Replies]

To: sickoflibs
I got this after reading the original thread post and later trolling sports boards. It grabbed my browser and took over after restart. I brought up the task manager *, closed Firefox and then ran SUPERantiSpyware Free Edition. Worked just fine taking out this trash.

Haven't had to do this for a while but I once had some rather nasty malware that even took over during attempts to run the safe mode. Searches led me to this,

* Bring up Task Manager as soon as the computer will let you during startup. To do this, hold down Ctrl-Alt- and only just tap on the Del key. Holding the Del key down will restart the computer. Next you have to be quick with this. Try to identify the bad process. Many malwares have a letter + number combo. Highlight the bad process and hit the End Process button at the bottom right of the task manger box. May take a few tries. This should allow one to run junk removal programs. If you don't, most likely the malware will show back up after restart.

111 posted on 12/29/2013 6:51:27 AM PST by Hillarys Gate Cult (Liberals make unrealistic demands on reality and reality doesn't oblige them.)
[ Post Reply | Private Reply | To 101 | View Replies]

To: Mycroft Holmes

The computers affected by Cryptolocker at this college computer laboratory were Linux systems. I asked whether or not they were running WINE or anything like it, and the answer was no.


112 posted on 12/29/2013 6:55:05 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 106 | View Replies]

To: WhiskeyX
According to the writeups at CERT and BleepingComputer this is a windows only infection. BleepingComputer goes into excruciating detail on this. This does not infect Linux Boxen, period, end of story.

I have read of an imitator that does run on Mac that looks like Cryptolocker but doesn't actually encrypt the files. This is written in Java so it could also infect Linux if you were to be su when it arrived. Shouldn't routinely be the superuser. Not prudent.

113 posted on 12/29/2013 7:02:12 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 112 | View Replies]

To: Mycroft Holmes

“According to the writeups at CERT and BleepingComputer this is a windows only infection. BleepingComputer goes into excruciating detail on this. This does not infect Linux Boxen, period, end of story.”

That is where you are wrong, because it is merely the beginning of a story which is still unfolding. Yes, it is true that CERT reported it was only a Windows vulnerability to the best of their knowledge at the time (at least the best of their disclosable knowledge).

US-CERT United States Computer Emergency Readiness Team
Alert (TA13-309A)
CryptoLocker Ransomware Infections
Original release date: November 05, 2013 | Last revised: November 18, 2013
http://www.us-cert.gov/ncas/alerts/TA13-309A

Nonetheless, as many of the news reports said Cryptolocker only affected MS Windows computers at the time of those news reports, they also frequently acknowledged it was only a matter of time before Cryptolocker was likely to also affect Apple and Linux systems. Many of these news reports making these claims date from September 2013 through early November 2013.

It is now the end of December 2013, and we now have an unconfirmed report from a Computer Science graduate, mature career IT professional, and current instructor at a college computer laboratory. If his report is accurate, Cryptolocker is now affecting Linux systems which are not running a vulnerable MS Windows VM (Virtual Machine). Like you, I commented upon the reports that claimed Cryptolocker currently affected only MS Windows system, and he replied by explaining how their Linux systems were affected and the US-CERT alert was now no longer accurate.

It doesn’t do any good to say Cryptolocker is incapable of breaching security to obtain privileges as a superuser with access to root. We have already seen how vulnerabilities in the past have given malware access to superuser privileges and root.

US-CERT United States Computer Emergency Readiness Team
Linux Root Access Vulnerabilities
Original release date: October 25, 2010 | Last revised: October 23, 2012
http://www.us-cert.gov/ncas/current-activity/2010/10/25/Linux-Root-Access-Vulnerabilities


114 posted on 12/29/2013 7:46:03 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 113 | View Replies]

To: miliantnutcase

Yes, I did that on one of the Dell Optiplex 755 computers which was compromised again after performing a typical high level format and reinstallation of MS Windows XP. This was the system where the FBI Ransomware disabled access to the AMI BIOS setup. Naturally, it is suspected the malware has hidden in an area of the hard drive which requires a low level format and other special nati-malware disinfection, or the malware has hidden itself in the BIOS firmware.

My or our current bet in this instance is an infection of the BIOS firmware. We’re going to attempt to remove the system board battery to power down the firmware to see if that clears any malware infection in that hiding place. That is a future to do project...not something I can afford to spend time on at present.


115 posted on 12/29/2013 7:55:25 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 110 | View Replies]

To: WhiskeyX
if you look at the BleepingComputer you will see that Cryptolocker requires .net to run. Yes, it is possible to write a virus that behaves as Cryptolocker does on Linux based machines, but very much harder. It isn't a port but a complete rewrite because .net doesn't run on linux except under a VM. There is much else about Cryptolocker that is MS only as well. RTFA.
116 posted on 12/29/2013 7:58:16 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 114 | View Replies]

To: miliantnutcase

“How does it infect without the user giving it sudo access?”

This may give you an idea of how it has occurred in the past with other vulnerabiities:

US-CERT United States Computer Emergency Readiness Team
Linux Root Access Vulnerabilities
Original release date: October 25, 2010 | Last revised: October 23, 2012
http://www.us-cert.gov/ncas/current-activity/2010/10/25/Linux-Root-Access-Vulnerabilities


117 posted on 12/29/2013 7:59:01 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 108 | View Replies]

To: WhiskeyX

Have you attempted a reflash of the bios?


118 posted on 12/29/2013 8:00:23 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 115 | View Replies]

To: WhiskeyX

Thanks for the read!


119 posted on 12/29/2013 8:01:16 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 117 | View Replies]

To: Mycroft Holmes

“Yes, it is possible to write a virus that behaves as Cryptolocker does on Linux based machines, but very much harder.”

Yes, of course it is. You are being too literal by treating Cryptolocker just as a specific software code, when it is the features of ransomware and destructive data encryption which are the specific behaviors that are associated with the Cryptolocker name. Naturally, any software code which implements the behavior associated with the Cryptolocker name and threats will need radical changes in the actual software code in order to affect operating systems and operating environments that have significantly different architectures. In these circumstances a malware code is all the same grief to the user if it looks and behaves like Cryptolocker. In other words, the user doesn’t much care how it works, except to defeat it, so long as the malware looks and acts the same with the same destructive results.


120 posted on 12/29/2013 8:10:14 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 116 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-134 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson