CryptoLocker, detected by Sophos as Troj/Ransom-ACP, a malicious program known as ransomware, is making rounds hitting computers via email attachments or via botnets.
Infecting your computer via Email Trojan
Infection through email may happen when you open an attachment containing the trojan. You have to take special care opening attachments, even if they look innocent enough.
Here is an example of email that masquerades as a Payroll report; the attached file, titled Payroll.xls, contains a variant of Win32/Kryptik.BOHR trojan.
When you are a small business owner, payroll may be on your mind, and if you go through your busy hectic day, you just may open an email to see what is it about.
In this example email came to an email address from an “administrator” of that domain. So if my email address is “email@example.com” – I may receive an email that looks as if whas sent directly to “firstname.lastname@example.org” from “email@example.com”. Being in charge of our email addresses I know for a fact we don’t have an “administrator” account – and to me it looks suspicious when I receive an email from a non-existent email address. But if you don’t personally manage email accounts for your business, this pattern may look innocent enough to you, and that’s what crooks are counting on – that you would trust the email and open the attachment.
But beware! Here is a little trick that may help you: check the headers of the email. In my example for Outlook I had to go to the File tab of the email message in question, and then to Properties and scroll through the details to find out more about this email’s origin. In my example another suspicious thing here was that reply-to address was firstname.lastname@example.org (which is one of the domain of American Express). So that’s when I know for sure that this is a manipulated email that I should not trust.
Don’t open attachments from emails you were not expecting – even if they look innocent enough. If they come from a person you know, but you want to be sure – you can always pick up the phone and check with the person if email was indeed sent by them and attachment was meant to reach you.
Infecting your computer via Botnet Trojan:
There have been reports that CryptoLocker also spreads via Botnet trojan – specifically ZeuS. It spreads when user chooses to click on a link that triggers a download and installation of the trojan. The link may mask itself as a legitimate download of a (counterfeit) executable program, ActiveX component of Java applet). There are also instances when the trojan can be run by clicking on a deceptive pop-up window.
What if it is too late and CryptoLocker got a hold of your computer?
If your computer got affected by CryptoLocker, you will see the red screen warning you that your files have been encrypted – and they will be the most important files on your computer — media (images, movie and music) files, documents, spreadsheets, notes, etc. — as well as any files on attached or networked storage media such as USBs.
CryptoLocker then demands payment via MoneyPak (Usa only), paysafeard, Ukash, cashU or Bitcoin.
The malware then takes it a step further: it installs a countdown clock on the your desktop that ticks backwards from 72 hours.
There’s only one decryption key, and the crooks have that on their server. If you want the decryption key, you will be subject to extortion payment of $300 to $400.
Victims who pay the ransom may receive a key that unlocks their encrypted files; those who let the timer expire before paying risk losing access to their files.
Now, lately there has been a new twist on the old trojan – a “CryptoLocker Decryption Service” can decrypt your files for a hefty fee of a several thousand dollars.
Check out this article in UK’s The Register: Late with your ransom payment? Never mind, CryptoLocker crooks will, er, give you a break (Ransomware hoodlums let you settle your bill later… for a price) Crybercrooks have begun offering a late payment option, which costs victim five times as much to “buy” the decryption key necessary to unscramble their encrypted files.
What about the computer network?
Well, I don’t know if it really qualifies as a good news – but here it is: while CryptoLocker trojan is very dangerous to your computer, it is not a virus. What it means is – it is not going to self-spread to infect your computer network – unless you deliberately run it on all your systems.
While it does not self-spread, it can still affect your network, because if you choose to launch it, the trojan can and search your network for files to encrypt.
That includes USB drives, network file shares, and even remote (cloud) storage folders that are made to appear as a drive letters by special software drivers.
CryptoLocker is also different from other types of trojans by allowing your computer and software to keep on working without crashing or freezing you system, but your files, such as personal documents, media, spreadsheets and others, are encrypted.
The criminals retain the only copy of the decryption key on their server – it is not saved on your computer, so you cannot unlock your files without their assistance.
If CryptoLocker is running and has already popped up its payment demand page, you can yous a good anti-virus program such as free Sophos Virus Removal Tool to remove it and clean up, but the Virus Removal Tool cannot decrypt your scrambled files – the contents are unrecoverable without the key, so you may as well delete them.
Read recently posted “Crypto Ransomware Family grows: what you need to know about CryptoWall trojan” for updates on additions to Crypto malware family, additional creenshots and tips on how to identify and rid of this ransomware.
Don’t want to get hit by ransomware? Be Proactive!
Make sure to have a good anti-virus system in place. Keep it up-to-date, make sure it does not expire and leave you unprotected – and update virus definitions on time, making sure it protects you from the latest threats.
Next, maintain a full, daily backup of your data OFF-SITE so that if you do get targeted by ransomware, you can recover all your files without payment. Also, remember to backup all of your devices: PCs, laptops, etc – and don’t forget remote offices and third-party software data stored in cloud apps as well.