Log in

View Full Version : Crypto Locker Virus



Ah Pook
10-26-2013, 18:22
Anyone seen this one?

One of my employees opened an email that turned out to be a virus similar to this. The email title was similar to something she was waiting for. It even had the town name in the title. You had to buy some anti-virus program to get the computer back. A quick trip to my computer geek fixed the problem.



http://www.examiner.com/article/crypto-locker-virus-holds-computer-hostage-and-ransom-demanded-up-to-700 (http://www.examiner.com/article/crypto-locker-virus-holds-computer-hostage-and-ransom-demanded-up-to-700)

October 26, 2013


Crypto Locker Virus infects computers across the nation today and it is not an easy virus to ignore. According to Fox News (http://www.myfoxmemphis.com/story/23791015/crypto-locker-virus-infects-computers-across-us) on Oct. 25, the Crypto Locker Virus “bullies you into taking the bait."


Being called “one of the worst viruses they have ever seen” by computer experts, essentially this Crypto Locker Virus “holds your computer hostage.” In a nutshell this Crypto Locker Virus demands you pay a set amount of the ransom money or lose everything on your hard drive. Computer experts say you might not have much of a choice but to pay the ransom.


How does the virus enter your computer?
The virus enters your computer through an email (http://www.examiner.com/topic/email-1) that you open because it looks like it’s from a legitimate company such as FedEx (http://www.examiner.com/topic/fedex) or UPS (http://www.examiner.com/topic/ups). It locks your computer up so you cannot access anything. This computer virus asks for a ransom that ranges from $100 to $300 so your computer will be restored back to normal. Some users have been asked to pay up to $700, claims one computer expert.


Computer Expert Anthony Mongeluzo reports you are left with two choices, the virus gives you 100 hours from the time you open the email to pay the ransom. This would be one of your choices. If you have a backup you can recover, which is your second choice.


If you don’t pay when the 100 hours are up, “you lose all your data,” said Mongeluzo. The virus has a special key and without that key, you can’t access your files. The ransom asks for the money then supplies you with that key when you pay.


Mongeluzo warns if you get the virus before paying the ransom bring your computer to an expert. There are now some copy-cats out there demanding a ransom, but they haven’t unleashed the Crypto Locker Virus into your computer. You would be paying the ransom for nothing.
How do you pay the ransom:


“The way they’re accepting payments is bitcoin, a new form of cash that’s been making headway on the Internet. It’s used for lot of illegal activities.” Mongeluzo said.


The Crypto Virus has already struck news station and they had no choice but to pay the ransom. ABC 33-40 in Birmingham, Alabama, was one of the many victims so far and the director of the station was left with no option but to pay the money demanded.
“You buy this $300 Green Dot MoneyPak, you cannot use a credit card for it, it had to be cash or debit card. Once they claim the funds, they unlock your files. If those files had been lost, it could’ve affected 10 years’ worth of work by several departments,” said Ron Thomas, the station director.

Warning: Be careful when you open emails and make sure all your files and photos are on backup, warns the computer experts today.

Aloha_Shooter
10-26-2013, 18:26
Mongeluzo warns if you get the virus before paying the ransom bring your computer to an expert. There are now some copy-cats out there demanding a ransom, but they haven’t unleashed the Crypto Locker Virus into your computer.

MOST of the instances I've heard of have been this: empty threats without actual virus packages. Bottom line, don't open .zip attachments and be very careful about Microsoft Word or Excel attachments as well.

cstone
10-26-2013, 18:30
backups... you can start doing them now, or wait till your computer crashes.

I'm convinced that Windows is a virus. [hahhah-no]

mackbamf
10-26-2013, 18:35
I had a client last week that got this. Encrypted their local docs as well as all the files on a shared drive. I was able to clean off the virus, but unable to un-encrypt the data. It was early in the morning and was able to do a shadow copy restore from server with essentially no data loss. Nasty little fucker...

Ah Pook
10-26-2013, 18:48
MOST of the instances I've heard of have been this: empty threats without actual virus packages. Bottom line, don't open .zip attachments and be very careful about Microsoft Word or Excel attachments as well.
Not a .zip or .exe. Just opening the email is enough.

There is a reason I back-up daily .

merl
10-26-2013, 18:54
Not a .zip or .exe. Just opening the email is enough.

There is a reason I back-up daily .

If just opening the email is enough, get a different email program (or start disabling scripts by default).

TFOGGER
10-26-2013, 19:33
I have my email sandboxed, scripts disabled, never open attachments. Plus, antivirus scans everything incoming and outgoing.

Danceswithwires
10-26-2013, 20:10
If you did get hit with this would you be able to backup your files with a Linux live disc prior to the execution of any virus?

scratchy
10-26-2013, 20:41
Good info here:

http://blog.malwarebytes.org/intelligence/2013/10/cryptolocker-ransomware-what-you-need-to-know/

sniper7
10-26-2013, 20:45
I just let my computer run wild with viruses so they fight each other and my shit gets left alone.

blacklabel
10-26-2013, 20:57
We get 10-15 of these a week at work. A couple coworkers have had everything encrypted and lost for good.

Danceswithwires
10-26-2013, 21:06
Good info here:

http://blog.malwarebytes.org/intelligence/2013/10/cryptolocker-ransomware-what-you-need-to-know/

Thanks, pretty much what I thought