More to come. Stay tuned…….
More to come. Stay tuned…….
Security is ever evolving — the moment a threat is borne, security researchers jump in to dissect the malware and derive a signature-based detection rule to pick up and hopefully thwart an infection.
This tried-and-true method has existed since the first publicly documented release of antivirus (AV) programs from several competitors in 1987. While most viruses were limited in scope as to payload (or damage), a lot has changed in the last several years — particularly with the increasing reliance on “always-on” systems for data communications.
Malware creators have embraced this always-on theory and exploited it to usher in a form of dynamism to their viruses, allowing them to not only be lightweight and stealthy, but also easier to modify (creating variants to avoid detection) and, in some cases, updatable like regular software to add features-rich payloads for future targeted attacks.
What is CTB-Locker?
As the CryptoWall (and its previous iteration CryptoLocker) malware has shown, the bar for exploits and potentially damaging payloads continues to rise. CTB-Locker (PDF) — the next in a growing trend of data-encrypting ransomware that is currently making the rounds around the web — is infecting enterprise and consumer stations.
The virus, upon infection, scans the computer and encrypts data based on file-types, targeting many types of files used in the enterprise, such as .PDF, .XLS, and .PPT to name a few. Upon encrypting the files, the virus will create a .TXT and .HTML file with instructions on how to obtain the decryption key, which will be available after paying the ransom stated (up to 3BTC). The decryption key will only be valid for up to 96 hours; after that time, the server will delete the decryption key, and the files will remain encrypted.
Where does it come from?
Its origin is currently unknown. However, perhaps a better question is: Where is it going?
CTB-Locker has been in the wild for sometime; infections were contained to particular parts of the world, yet slowly, more and more infections are popping up in France and Spain, which indicate the malware is proliferating worldwide.
How does it infect a computer?
Infection has been traced primarily back to spam containing the malware as an attachment in a .ZIP file. When this attachment is opened, it creates a copy of itself in the %Temp% folder. Upon launching, it injects malicious code to the svchost.exe process of a Windows computer which, in turn, creates a scheduled task to the file located in the %Temp% folder to run on startup.
A mutex (i.e., a program thread that allows shared resources to run, but not simultaneously) is created to ensure that only one instance of the malware will run at any given time. This injected code in the svchost.exe is the same process that will encrypt the data on the computer based on file-types.
Will I know if my computer is infected?
As with CryptoWall, there are signs that indicate if CTB-Locker has infected your system’s data.
Additionally, a ransom screen will appear just after successfully authenticating that will display a warning indicating that the computer has been compromised by CTB-Locker, and that the countdown of 96 hours has begun in order to pay the ransom and obtain the decryption key to decrypt the data.
Following the steps included in the .HTML file, the instructions will require the end-user to install Tor in order to communicate with the virus writer’s server and show proof of payment (made in Bitcoin). Once the payment has been verified, the decryption key will be made available to the end-user to decrypt the encrypted files.
Also, the CTB-Locker warning screen allows the end-user to decrypt five files for free to prove the decryption key is valid and upon payment, the end-user will be allowed to regain the use of his/her data.
What options are available if a computer is infected with CTB-Locker?
Confirm that the infection is CTB-Locker by testing it with any of the encrypted files using the upload mechanism built-in to the Tor URL provided. If the file is not decrypted, another virus may have infected the computer, or the time limit has expired on retrieving the files. In either scenario, please read the following section.
If the file is successfully decrypted and you have agreed to pay the ransom, take a few things into consideration (I wrote the following about CryptoWall, but my advice holds true for CTB-Locker as well):
“Paying the ransom is an exercise in and of itself. Unfortunately, the ransom amount must be paid in Bitcoin, a digital currency that’s used to purchase goods and services, similar to US currency. However, due to its lack of regulation and general lack of acceptance, Bitcoin is a niche market and not as common as US currency.
Adding to the difficulty of procurement is that many exchanges that accept US currency for Bitcoins have limited purchases of larger Bitcoin amounts. There are also strengthened company policies that further restrict the accumulation of the necessary amount of Bitcoins to pay off the ransom. Many of these changes have come about as a direct result of the CryptoWall virus, with some exchanges known to cancel transactions and restrict accounts suspected of using their services to pay off the ransom.
Though difficult, it’s still possible to open an account at an exchange to begin funding the purchase of Bitcoins in order to pay the ransom in the time allotted. If neither time nor technology is on your side, another viable option is seeking out the services of an IT consultant with experience in this matter. They may be able to assist you in the overall recovery process of your data and may even be able to do so without incurring any penalty due to non-payment within the specified time frame.”
I cannot/will not pay the ransom. Are other options available to recover the data?
Deciding whether to pay the ransom is a matter of personal choice that comes down to the intrinsic value of the data lost. While paying for the decryption key may be a simpler (and sometimes the less costlier) option than say, hiring a consultant or assigning IT members to work on data recovery, there may be no choice in the matter for certain regulated entities or for those whose time limit has expired.
Fortunately, there are things end-users can do to see if their files are recoverable without paying. Please realize that this is a big IF, and most cases will result with loss of data for non-payment, while those who do pay within the time frame will be able to recover their data through the use of the private key used for decryption.
With that disclaimer in place, the most effective method to recover your files is by using a backup. If your files have been backed up regularly, connect your backup drive to a non-infected computer to check your files; if they are on there and not infected, you clean the infected computer of infection, and you’ll be able to reconnect the drive to restore your data.
If a cloud-based backup exists, depending on the service provider, you may be able to sanitize the computer before restoring your files from the cloud. Some cloud services (e.g., Dropbox) store a local copy of the data on the host; in these cases, most of the cloud services offer file versioning as a form of added protection against file modifications made in error. By using this feature after sanitizing the computer, you should be able to roll back a file change to the date and time prior to the infection.
If no unaffected local or cloud-based backups exist, then the only chance at file recovery will lay in the VSS, restore previous file versions, or System Restore. Since much of the CTB-Locker infection is automated and the newest variation as of January 2015 executed commands to delete Shadow Copies of files, there are times when a command can’t execute due to a system resource issue or hanging app. In these cases, though rare, recovery may be possible by initiating a system restore to a time and date prior to the infection occurring. Note: This is the exception, not the rule, and each situation should be handled on a case-by-case basis.
Also, you might try using ShadowExplorer to attempt to restore a file or two first to test if this method works for you; if it does, remember to clean the computer first to get rid of any infections before trying to restore all your data. If the system is not cleaned, it will only try to encrypt the files again — and this time, it may succeed in stopping VSS and clearing the cache.
Which steps should be taken to protect computers?
There are several steps that should be taken at all times, regardless of the infection risk. The following suggestions apply to security best practices for computers and not just to a particular virus or subset of malware.
There should be an active AV application installed with the latest virus definition files and real-time scanning of the system at scheduled times and when opening files. Additionally, a malware scanner with active scanning capabilities and updated with the latest definition files should be used and not disabled at all times.
Lastly, a personal firewall is included with every modern computer OS; this firewall should be enabled and configured so that only traffic from known applications can be uploaded/downloaded. All other traffic — especially from unknown origins — should be halted until authorized by the end-user.
With your computer(s) protected, we move on to one of the greatest threats facing security: users. Educating end-users is tantamount to computer-based protections. After all, the end-user may have the ability to disable a firewall because it’s “too annoying” or stop an AV scan because “the computer’s running too slowly.” Moreover, end-users should be trained to be conscious of not clicking unknown links or installing questionable software since many of the malware infections today start out as phishing attempts and later propagate into relayed spam emails that cast a wider net.
Next, securing the network, including reigning in user accounts with unnecessary access to data — both locally and stored on server shares. In the case of CTB-Locker, the degrees to which files become encrypted are limited to the access rights that the logged on end-user has associated to his/her user account. In corporate environments where users are almost always using standard accounts with limited rights, only the files to which they have full-access rights to — namely, their profile folder — will be affected by file encryption; however, for those end-users whose accounts have administrative rights to a system, all files can be potentially encrypted. Security administrators would be well served by performing regular audits of users’ and group’s rights on the network, as well as, on local computers. Best practices based on the principle of least privilege are a good foundation to build from.
Backup or — in some instances — lack thereof. A proper backup system with preferably a local and cloud-based backup schedule will go above and beyond to protect your data. Even when the system is compromised, you can count on being able to restore your data, as needed.
Other considerations for protection include safe internet practices. Don’t visit questionable websites, never click links found within emails, and certainly never provide anyone any form of personally identifiable information in chat rooms, forums, discussion boards, or social media sites!
Lastly, consider enabling software restriction policies if you’re a system administrator on an enterprise network or using a freely available application such as CryptoPrevent to block many of the avenues to which CTB-Locker uses to gain a foothold on your computer.
The bottom line
Security is not IT. Security is not an organizational or operations bullet point. Security is everyone, everywhere that is actively engaged in using technology to communicate, send/receive data or otherwise for personal and/or professional use.
Security is everyone’s responsibility. And while that might not be much to curb malwares existence, it will go a long way toward ensuring that malware infections don’t lead to data loss and corruption or being spied on and having sensitive information leaked.
We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts.
Windows 8 has been detestation to Microsoft that Windows 9 is not going to be there. Rather, the unpopularity has led to the skipping of 9 for Windows 10 with marked improvements. The main reason for Windows 10 is perhaps the creation of a shared UI for devices from Tablets to Smartphones right to computers. The Tuesday 30th of September press conference by Microsoft was clear to everyone the company was admitting Windows 8 did not do as they expected and the latest Operating System will no be anything like it, claiming that the new OS will remind many of Windows 7 while incorporating a few Windows 8 elements.
Touch and Charm
In essence, Touch remains generally the way it has been as Charms bar will not be going anywhere although there will be a couple of tweaks. Windows 10 will bring about a transition in the use of the keyboard with the use of touch as the interface of the device changing as per the input of the user.
Return of the Start menu
At the left and front of the UI, Microsoft is returning the Start Menu in Windows 10. Once clicked the menu divides into double columns with one having icons in the form of applications and the other more like the traditional list. The shape and size of the Start Menu is also easy to manipulate, which is the entry to apps. Start Menu also comes with a universal search that shows results from the internet.
Changed command prompt
While the command prompt is mostly used by those who know it well, it will be very easy to use in Windows 10. Before, to paste something you needed to have a context menu opened but now Control V will be enough.
Since Microsoft is looking for feedback this time round, it has added the Windows Inside Program (WIP) where enthusiasts of Windows can help in the analysis and evaluation of Windows 10. Essentially, feedback is expected to be from anyone who understands such concepts as BIOS and DLL.
With the Task view users can now access various desktop screens showing multiple applications in use. The Windows or mini-screens appear at the interface’s bottom. Through the use of the UI’s Snap Assist newly added at the side of the PC screen, it is possible to get applications from other desktops. They are wonderful for those power users known to utilize many programs at the same time and also for extending the time frame. It is the kind of feature that returns Microsoft at the top of the desktop competition as opposed to Tablets, Smartphones and other devices.
Ready to do business
As enterprise featured a lot in California, Windows 10 seemed to have been appealing directly to giant businesses to return to Microsoft. This is because the new OS according to Microsoft is compatible with each of the contemporary management systems with productivity being the main result of using the product. Corporate and personal data has also been separated to allow various security levels so that top-secret data or information that requires serious privacy is protected.
He dropped his kid off for a haircut next door and went back into his car for 30 minutes sitting in front of my driveway/garage door.
He finally moved when I opened my garage door and told him to leave.
Funny, but his kid walked out as he backed up.