Cryptolocker: How to avoid getting infected and what to do if you are (2024)

Feature

There's a new piece of ransomware in town; here's how to protect your company's assets

By Jonathan Hassell

Contributing Writer, Computerworld |

There's a big threat wiling around on the Internet right now: A particularly nasty piece of ransomware called Cryptolocker. Many, many organizations are being infected with this malware, but fortunately, there are surefire ways to avoid it and also ways to mitigate the damage without letting the lowlifes win.

What is Cryptolocker?

Cryptolocker comes in the door through social engineering. Usually the virus payload hides in an attachment to a phishing message, one purporting to be from a business copier like Xerox that is delivering a PDF of a scanned image, from a major delivery service like UPS orFedEx offering tracking information or from a bank letter confirming a wire or money transfer.

Cryptolocker: How to avoid getting infected and what to do if you are (2)

The virus is, of course, an executable attachment, but interestingly the icon representing the executable is a PDF file. With Windows' hidden extensions feature, the sender simply adds ".pdf" to the end of the file (Windows hides the .exe) and the unwitting user is fooled into thinking the attachment is a harmless PDF file from a trusted sender. It is, of course, anything but harmless.

Once Cryptolocker is in the door, it targets files with the following extensions:

*.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.pdf, *.eps, *.ai, *.indd, *.cdr, *.jpg, *.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c

When it finds a file matching that extension, it encrypts the file using a public key and then makes a record of the file in the Windows registry under HKEY_CURRENT_USER\Software\CryptoLocker\Files. It then prompts the user that his or her files have been encrypted and that he or she must use prepaid cards or Bitcoin to send hundreds of dollars to the author of the malware.

Once the payment has been made, the decryption usually begins. There is typically a four-day time limit on the payment option; the malware's author claims the private key required to decrypt files will be deleted if the ransom is not received in time. If the private key is deleted, your files will essentially never be able to be decrypted -- you could attempt to brute force the key, but as a practical matter, that would take on the order or thousands of years. Effectively, your files are gone.

Currently, the only versions of Cryptolocker in existence target files and folders on local drives and mapped drives. The malware does not currently attempt to perform its malfeasance over network-based universal naming convention paths, although one would surmise this would be a relatively simple change for the author of the ransomware to make.

Antivirus and anti-malware programs, either running on endpoints or performing inbound email message hygiene, have a particularly difficult time stopping this infection. Unless you have a blanket email filtering rule stripping out executable attachments, and that tool is intelligent enough to do so without allowing the user to request the item's return from quarantine, you will see your users getting these phishing messages attempting to introduce Cryptolocker. It is only a matter of time.

Prevention: Software Restriction Policies and AppLocker

As of now, the best tool to use to prevent a Cryptolocker infection in the first place -- since your options for remediating the infection involve time, money, data loss or all three -- is a software restriction policy. There are two kinds: Regular software restriction policies, and then enhanced AppLocker policies. I'll cover how to use both to prevent Cryptolocker infections.

Software Restriction Policies

Software Restriction Policies (SRPs) allow you to control or prevent the execution of certain programs through the use of Group Policy. You can use SRPs to block executable files from running in the specific user-space areas that Cryptolocker uses to launch itself in the first place. The best place to do this is through Group Policy, although if you're a savvy home user or a smaller business without a domain, you can launch the Local Security Policy tool and do the same thing.

One tip: if you're using Group Policy, create a new GPO for each restriction policy. This makes it easier to disable a policy that might be overly restrictive.

Related:

  • Windows
  • Malware
  • Server
  • Security
  • Enterprise Applications
  • Small and Medium Business
1 2 3 Page 1 Next

Page 1 of 3

It’s time to break the ChatGPT habit

Cryptolocker: How to avoid getting infected and what to do if you are (2024)

FAQs

What is the preferred method to avoid getting infected by the CryptoLocker virus? ›

US-CERT advises users to prevent CryptoLocker ransomware by conducting routine backups of important files and keeping the backups stored offline. Users should also maintain up-to-date antivirus software and keep their operating system and software up to date with the latest patches.

What do you do if you get a CryptoLocker? ›

Cryptolocker Removal

Once your users detect a ransomware demand or virus, they should immediately disconnect from the network. If possible, they should physically take the computer they've been using to their IT department. Only the IT security team should attempt a reboot.

How can we protect against crypto ransomware? ›

To help manage this risk, implement strong user authentication — including multi-factor authentication (MFA). Anti-Ransomware Solutions: Anti-ransomware solutions can detect and block crypto ransomware before it reaches an organization's systems. This helps to limit the risk to the business and its data.

What are the symptoms of CryptoLocker virus? ›

Typically, you will see nothing wrong with your computer until all files have been encrypted. Then, a warning will pop up indicating that you have been infected and showing a countdown timer until all your data is destroyed. Many antivirus programs can remove this Trojan, but are unable to decrypt your data.

How was the CryptoLocker virus stopped? ›

CryptoLocker was isolated in late May 2014 via Operation Tovar, which took down the Gameover ZeuS botnet that had been used to distribute the malware.

What is the best practice to avoid virus attacks? ›

Keep your device secure
  • Keep up-to-date. Update your system, browser, and important apps regularly, taking advantage of automatic updating when it's available. ...
  • Antivirus software. ...
  • Antispyware software. ...
  • Firewalls. ...
  • Choose strong passwords. ...
  • Use stronger authentication. ...
  • Be careful what you click. ...
  • Shop safely.

How does CryptoLocker infect your computer or phone? ›

CryptoLocker is commonly delivered through infected email attachments and links from an unknown sender. Once an unsuspecting email recipient clicks on an infected link or attachment, the malware encrypts files and stores the key on its own server.

Is CryptoLocker still a threat? ›

“Government testing of Cryptolocker malware samples has confirmed that Cryptolocker is no longer able to encrypt newly infected computers and, as a result, is not currently a threat,” the government said in an update filed in the U.S. District Court of Western Pennsylvania Friday.

How much money did CryptoLocker make in 100 days? ›

At that rate however it's likely that the CryptoLocker gang managed to convince at least 1,000 or so victims to pay up. At $300 a pop, that's a cool $300,000 the attackers earned in just over 100 days, a profit they've clearly managed to conceal.

Does VPN protect against ransomware? ›

However, it's important to note that a VPN alone cannot protect you from ransomware attacks. It's crucial to have other security measures in place, such as antivirus software and regular data backups.

Can antivirus stop ransomware? ›

Overall, antivirus alone may protect your organisation against ransomware, at a basic level, but it won't stop it after it's infiltrated your system.

How can I tell if I have a malware infection? ›

Here are a few telltale signs that you have malware on your system:
  • Your computer slows down. ...
  • Your screen is inundated with annoying ads. ...
  • Your system crashes. ...
  • You notice a mysterious loss of disk space. ...
  • There's a weird increase in your system's Internet activity. ...
  • Your browser settings change.

How many people were infected by CryptoLocker? ›

CryptoLocker ransomware was known to have infected 250,000 computers within the first four months of the malware. This is because CryptoLocker was the first sophisticated attack of its kind, encrypting Windows operating system files and making them unusable and restricted for users.

What are some signs you are infected with malware? ›

How To Know if You Have Malware
  • suddenly slows down, crashes, or displays repeated error messages.
  • won't shut down or restart.
  • won't let you remove software.
  • serves up lots of pop-ups, inappropriate ads, or ads that interfere with page content.
  • shows ads in places you typically wouldn't see them, like government websites.

What is the best protection against ransomware? ›

Use VPN services on public Wi-Fi networks: Conscientious use of public Wi-Fi networks is a sensible protective measure against ransomware. When using a public Wi-Fi network, your computer is more vulnerable to attacks. To stay protected, avoid using public Wi-Fi for sensitive transactions or use a secure VPN service.

What is the most effective control against ransomware? ›

Our Top 8 Picks
  • Bitdefender Antivirus Plus. Best for Multi-Layered Ransomware Protection. ...
  • Webroot AntiVirus. Best for Reversing Ransomware Effects. ...
  • Acronis Cyber Protect Home Office. ...
  • Check Point ZoneAlarm Anti-Ransomware. ...
  • NeuShield Data Sentinel. ...
  • Sophos Home Premium. ...
  • Data443 Ransomware Recovery Manager. ...
  • Panda Dome Advanced.

Why does the CryptoLocker virus cause harm ________? ›

CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops and network shares and “holds them for ransom”, prompting any user that tries to open the file to pay a fee to decrypt them.

What is most important to remember about CryptoLocker and other ransomware? ›

Safeguard your personal information: It's important to always protect your personal information online. If it ends up in the wrong hands, cybercriminals may take advantage of it and target you with CryptoLocker and other types of ransomware attacks.

Top Articles
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6768

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.