It's called Cryptowall. One of my associates had this happen to his company.
We had a discussion in one of our IT groups. Following is a description from
the meeting:

Crypto Wall - Attacked a windows 7 machine behind a strong firewall on a
members network
It bypassed the anti-virus which was up to date and laid dormant for days
before being noted.
It infected local and mapped drives only. Malware bytes was able to find and
remove the infection but was not able to unencrypt the already encrypted
files.

Anti-virus in use was Microsoft Security Essentials on windows 7 and
Microsoft Defender on windows 8.

Crypto Wall appears to have been released into the wild on Sept 14th.

The backup files were stored "online" locally and also on mapped drives, the
backup files were also encrypted and unusable.

Offline backups is the only protection and the member did not have them.

They were able to purchase bitcoins and pay the ransom directly.

Bitcoins - One of our members recently purchased $500 US Dollars through a
bank machine like physical device where you put in bills and it transfers
bit coins into your account. Bit Sent was the company that told them about
the machines.

http://www.bitsent.ca/bitcoin-avm the listing shows 2 devices but the one in
Guelph is closed, only the Mississauga device is in operation.

Alan Lukachko
[email protected]
Software Strategies
PO Box 265 
Rockwood, ON N0B 2K0
Canada
(519) 856-0700

DISCLAIMER: The information in this message (and any attachments) is
directed in confidence and may be legally privileged. It is intended only
for the addressee(s) listed above and any other use or disclosure is
strictly forbidden. The contents of this communication may also be subject
to lawyer-client privilege, and all rights to that privilege are expressly
claimed and not waived. Access to this message by anyone else is
unauthorised. If you are not the intended recipient, any disclosure,
copying, or distribution of the message, or any action or omission taken by
you in reliance on it, is prohibited and may be unlawful. If you have
received this communication in error, please immediately notify the sender
by telephone, notify the sender by reply e-mail and delete this
communication (and any attachments) without making a copy. We will reimburse
you for any telephone and postage costs. Thank you. 

-----Original Message-----
From: ProfoxTech [mailto:[email protected]] On Behalf Of Paul
Hill
Sent: Thursday, October 16, 2014 4:55 PM
To: [email protected]
Subject: Another ransomware Trojan infecting DBF files

Hi All,

Just a heads up.  Today I was working with a customer that had corrupt DBF
files.
It was not possible to open the files in fox (not a dbf file).

Looking at the files in HXD (a very good free WIndows hex editor) I could
see that the contents were *totally* scrambled.

In each file the first 16 bytes was the same.

Luckily we had a backup from 03:00 in the morning (problem reported late
afternoon).
My local contact reported:  "on the c:\ root there was a file called
"decrypt instrutions.html"

It's not CryptoLocker but something else.
If I find out more I'll let you know!

--
Paul

[excessive quoting removed by server]

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/025701cfe98b$722a6260$567f2720$@com
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to