You mentioned that you have Win7 Pro. In case you haven't already, I would suggest enabling Software Restriction Policies to help prevent this from happening again (built into Win7 Pro). And EMET to be on the safe side.
-Aakash Shah From: [email protected] [mailto:[email protected]] On Behalf Of Jon Harris Sent: Sunday, November 2, 2014 11:59 AM To: [email protected] Subject: RE: [NTSysADM] Security question from a non-security person Just my luck it appears to be a crypto wall infection. Thanks at least I have another tool. Unfortunately the PST is too large and the several documents I just tried just in case said it was not a crypto locker. Joy upon joy my wife loaded up the system I had just disinfected twice and re-infected her profile again. Once I get it done this time I am killing the profile! I have 4 copies of it anyway. Jon ________________________________ From: [email protected]<mailto:[email protected]> To: [email protected]<mailto:[email protected]> Subject: Re: [NTSysADM] Security question from a non-security person Date: Sun, 2 Nov 2014 13:20:34 +0000 The one scenario where I've found shadow copies useful with CryptoWall is recovering a share that was infected, since the PC can't delete shadow copies on a server. Of course, it's a sever and should have backups already, but that is besides the point if you're dealing with the infection. Sent from my Verizon Wireless 4G LTE DROID Susan Bradley <[email protected]<mailto:[email protected]>> wrote: Certain vintages of Cryptolocker actually has a means to get the files back without paying. https://www.decryptcryptolocker.com/ Try that. Cryptowall /not so lucky. Crypto wall and locker both prove a really really hard lesson - have a backup. The shadowcopy trick is something the attackers realized they left behind and later variants started nuking the shadow copies. Susan Bradley http://blogs.msmvps.com/bradley http://www.runasradio.com/default.aspx?showNum=390 On 11/1/2014 9:50 PM, Jon Harris wrote: > I just confirmed all shadow copies were deleted from when the > infection started. Thanks at least I have another trick in case I > have this happen again. > > Jon > > ------------------------------------------------------------------------ > From: [email protected]<mailto:[email protected]> > To: [email protected]<mailto:[email protected]> > Subject: RE: [NTSysADM] Security question from a non-security person > Date: Sat, 1 Nov 2014 23:31:25 -0500 > > There is a hidden, and I mean well hidden, My Documents folder in the > root and then there is the available Users folder. It sounds like the > same one. I have only been able to see the My Documents folder using > a Linux distro and that is where previously I was able to pull copies > for the user (not my wife). I only found it then because I was doing > a scan using the Linux distro to look for bugs. The user did not have > any copies of some of the software on the system so a rebuild was not > possible. > > Jon > > ------------------------------------------------------------------------ > From: [email protected]<mailto:[email protected]> > To: [email protected]<mailto:[email protected]> > Subject: RE: [NTSysADM] Security question from a non-security person > Date: Sun, 2 Nov 2014 03:23:00 +0000 > > Out of curiosity, what is the path you're referring to as a second > profile? > > The only thing I can think of that looks anything like a second copy > is the "Documents and Settings" junction point on Windows Vista+ > > Matthew Topper > > *From:*[email protected] > [mailto:[email protected]] *On Behalf Of *Jon Harris > *Sent:* Sunday, November 02, 2014 12:15 AM > *To:* [email protected]<mailto:[email protected]> > *Subject:* RE: [NTSysADM] Security question from a non-security person > > Windows 7 Pro x64, no domain, and I don't think the shadow copies are > on. I looked but did not see a restore from shadow copy available. I > will look again. > > Jon > > ------------------------------------------------------------------------ > > From: [email protected]<mailto:[email protected]> > <mailto:[email protected]> > To: [email protected]<mailto:[email protected]> > <mailto:[email protected]> > Subject: RE: [NTSysADM] Security question from a non-security person > Date: Sun, 2 Nov 2014 03:04:49 +0000 > > The only method anyone has had success with aside from paying the > ransom or restoring from backup is pulling the data from a shadow copy. > > Shadow Explorer seems to work well for browsing them, though newer > instances of the crypto viruses are clearing restore points as part of > infection. > > Matthew Topper > > *From:*[email protected] > <mailto:[email protected]> > [mailto:[email protected]] *On Behalf Of *Jon Harris > *Sent:* Sunday, November 02, 2014 12:01 AM > *To:* [email protected]<mailto:[email protected]> > <mailto:[email protected]> > *Subject:* [NTSysADM] Security question from a non-security person > > I am really hoping someone has an idea of how to go about this. > Before I start let me say I have only gotten started on this but it is > outside my normal area of expertise so I will be looking on the web. > > Issue > > Wife (yes my wife) ignored me about doing backups, not blocking > updates, and being more careful about her browsing habits. She > managed to get bit by a crypto virus which I can get the name of if > necessary. All of her files have been encrypted including a 5.3 GB > PST. Her email is Gmail and I set her up to use POP, more than that > is just too hard for her. She is not dumb by any stretch just very > stubborn, and in some computer areas extremely smart. Security is > just not one of those areas. While I know enough to be able to do > some simple security work I don't pretend to be a Security person. > Anyway I have removed the bugs, all were specific to her profile only > (thank God she is only a user). I have used a Linux distro to archive > the two copies of her profile, you do know there are two copies > right? Well anyway on a previous virus infection I got luck (to bad > not this time) and only one of the copies was damaged. I am still > doing some clean-up but at the moment it appears both copies were > encrypted. Normally I would just tell the user, so sorry/to bad and > blow the machine away and start over. That will not be possible as > this is my wife and for those with a SO and like to keep peace in the > house you would know that is not happening unless there is no other way. > > Question > > Has anyone found a way OTHER than paying these creeps off to get these > files de-encrypted? Like I said I am still in the cleanup and getting > the machine ready for use again and have not yet done any web > searches. Oh and paying them off is not even is the room with the table! > > Side note > > Why is it the IT person is the one blamed when a user ignores what we > tell them and gets bit by a bug? > > Thanks for any ideas or suggestions, > > Jon >

