TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

You’re infected—if you want to see your data again, pay us $300 in Bitcoins

380 pointsby eluxover 11 years ago

59 comments

blhackover 11 years ago
You can work to prevent this by creating a group policy that disallows<p><pre><code> %AppData%\*.exe </code></pre> and<p><pre><code> %AppData%\*\*.exe </code></pre> A good discussion of this happened here: <a href="http://www.reddit.com/r/sysadmin/comments/1mizfx/proper_care_feeding_of_your_cryptolocker/" rel="nofollow">http:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;sysadmin&#x2F;comments&#x2F;1mizfx&#x2F;proper_care...</a><p>sidenote: this virus actually scares me, and it sounds like it actually scares most people who work in IT. This is the shittiest thing anybody has ever seen, it sounds like.
评论 #6568974 未加载
评论 #6568113 未加载
评论 #6568152 未加载
评论 #6568809 未加载
评论 #6568242 未加载
评论 #6568631 未加载
评论 #6568770 未加载
评论 #6568816 未加载
MiguelHudnandezover 11 years ago
I was hit by this, or a variant, at my place of business. Hundreds of thousands of files on our shared drive were overwritten, about 2 TB worth of files. Office documents, PDFs, and Adobe documents like PSD and INDD were encrypted. JPEGs were altered but still viewable. All files increased in size by a few hundred bytes.<p>Pull-only backups were the savior here, although because we didn&#x27;t notice until the next day, the pulled backups on that system were also overwritten with encrypted&#x2F;corrupt files. Luckily we had VSS versioning on the pull-only backup location. There was a close call in that the 2 TB or so of &quot;new&quot; data ended up pushing VSS over quota and we almost lost our good versions of the files that way. If not for the VSS versions, we would&#x27;ve had to resort to cold backups which would&#x27;ve been a bit older. As it stood, no file recovered was more than a few hours old.<p>Auditing on the file share indicates which workstation was infected. Pertaining to that: it surprises me that in 2013, a default install of Windows will not log any useful information about shared folders by default. You must enable object auditing in Group Policy and specifically declare which users or groups are subject to said auditing on a share-by-share basis. In a world without logrotate, I suppose a sensible default is to just let a bunch of shit happen without recording it.<p>What gets me wound up most of all is the amount of engineering involved for an average home user to protect themselves. I thought a Mac with Time Machine was enough, but a similar virus would easily corrupt those backups if they were available to it over a mapped drive.<p>It is the goddamn 21st century, and users are still losing work by overwriting documents by accident, or opening a document as an e-mail attachment and not being able to find the actual file they edited. Should people really need an IT guy with ten years of experience to be protected from simple mistakes? Google has made progress on that front with the Chromebook, I suppose.
评论 #6569864 未加载
评论 #6570379 未加载
评论 #6570213 未加载
评论 #6572171 未加载
评论 #6571931 未加载
antiheroover 11 years ago
I think the interesting thing here is the shift from the target - the &quot;best&quot; target used to be compromising the OS, so OS&#x27;s made moves to protect themselves from programs running as unprivileged users. Now, it&#x27;s trivial to wipe an OS and restore from a backup. The real value is the things people store on a computer, which are usually going to be accessible via a user account.<p>One trivial solution would be OS level automatic versioning of files (ala Dropbox or Sparkleshare) - the original files would be written to location that is read only to the user and only accessible via the OS, hence, backups could always be restored from it, but never destroyed without admin rights.<p>Of course, with people having great internet and whatnot, an automatic cloud based solution would be much more likely and useful.<p>I think with Windows 8.1 and onwards, Microsoft are automatically doing this by setting up the &quot;Documents&quot; type folders in SkyDrive - a great think moving forward.<p>Backups are, obviously, a much better solution but require extra storage and usually cost money.<p>So there might be a niche for a freeware product that runs as an admin that automatically versions files - perhaps even as simple as having an admin-owned .git repo for the Documents folder.<p>The worrying thing about this attack is that targeting user data is trivial on all OSs, because of the way we think about privileges - it could be done to us Linux users through something nasty in our shell rc using GPG or whatever. There is no need to compromise anything.
评论 #6568664 未加载
评论 #6568316 未加载
评论 #6568336 未加载
评论 #6569031 未加载
评论 #6568425 未加载
ggchappellover 11 years ago
I get annoyed when people are warned not to open some attachment. The real problem here is that in 2013 we&#x27;re still using the flawed language of &quot;opening attachments&quot; -- as if running a native executable with full permissions is an action that belongs in the same category as viewing an image, reading a text file, or listening to music.<p>Well, it doesn&#x27;t. This is a problem that should have been solved at the level of OS permissions&#x2F;UI long ago. Why does a modern OS include UI functionality allowing a standard user to run an uninstalled executable in a non-sandboxed environment? There&#x27;s no good reason for it.<p>In some cases the problem been solved (e.g., restrictions that allow only signed apps to be executed). But I guess none of those cases include Windows, its standard UI, and popular e-mail programs. :-(
评论 #6569537 未加载
评论 #6568642 未加载
评论 #6570444 未加载
susi22over 11 years ago
In a corporate environment I&#x27;d expect crucial data to be on the network drive and snapshotted every few hours. We run ZFS on our network and all the secretaries have to do their doc&#x2F;excel work on the drive. Nowadays that everybody has a Gigabit Ethernet connection read&#x2F;writes are extremely quick.<p>Use ZFS and make read only snapshots that are only accessible to the sysadmins. You&#x27;ll solve many problems that way. We do snapshots at 6am,noon and 6pm and then keep the 6pm one for 7, 14 and 30 days.
评论 #6569061 未加载
评论 #6568437 未加载
评论 #6568296 未加载
评论 #6568333 未加载
评论 #6568610 未加载
评论 #6568328 未加载
Fuzzwahover 11 years ago
Victims don&#x27;t even get the enjoyment of having to make their payments in some far flung corner of an MMO, like the plot of Reamde.<p><a href="https://www.goodreads.com/book/show/10552338-reamde" rel="nofollow">https:&#x2F;&#x2F;www.goodreads.com&#x2F;book&#x2F;show&#x2F;10552338-reamde</a>
评论 #6568169 未加载
评论 #6567903 未加载
amalagover 11 years ago
A company I work with was hit when the employee opened a phishing email supposedly from another employee in the same company. It hit about 50 gb of data on the shared drive. We had Crashplan and restored from a few days previous. I then turned on DKIM and enabled quarantining non DKIM emails via DMARC.
评论 #6568024 未加载
评论 #6571975 未加载
andybakover 11 years ago
Everyone is talking about post-infection. However - this passage from <a href="http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information" rel="nofollow">http:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;virus-removal&#x2F;cryptolocker-r...</a> seems fairly key also:<p>&quot;This infection is typically spread through emails sent to company email addresses that pretend to be customer support related issues from Fedex, UPS, DHS, etc. These emails would contain a zip attachment that when opened would infect the computer. These zip files contain executables that are disguised as PDF files as they have a PDF icon and are typically named something like FORM_101513.exe or FORM_101513.pdf.exe. Since Microsoft does not show extensions by default, they look like normal PDF files and people open them.&quot;<p>I haven&#x27;t got a Windows box handy to try this on but I assume there is at the very least an extra warning dialog when opening an exe - even a zipped exe?<p>Not that that mitigates this at all. The inability to distinguish executables from data files - and although that doesn&#x27;t apply in this case - the ability of data files to hide executable payloads either via design or error - is a major and currently uncorrected flaw in the system.
评论 #6570728 未加载
coryfkleinover 11 years ago
Ah, I guess it is time to send the annual email to mom, dad, and the in-laws to be very wary of downloading anything or clicking on links in suspicious emails.<p>I find this is good insurance against the inevitable phone calls I receive as the only computer-literate member of the family: &quot;Hey Cory, all my documents disappeared and I can&#x27;t get them back. Do I have a virus?&quot;
mariuoloover 11 years ago
I&#x27;m sorry, but if a firm doesn&#x27;t compartimentalise access and a single infected workstation can bring down everything, then they deserve what they get.<p>Hadn&#x27;t been ransomware it could have very well been a disgruntled employee, to the same effect.
评论 #6568219 未加载
评论 #6568033 未加载
评论 #6568513 未加载
评论 #6570320 未加载
fekbergover 11 years ago
I&#x27;ve been trying to raise awareness in my social medias, since my family, friends and co-workers might not spend time on HackerNews.<p>If you want, copy my message and share with your family, friends and co-workers:<p>&quot;Hi folks,<p>There&#x27;s a new virus out there that I want to raise awareness of, it&#x27;s called CryptoLocker. Basically what this virus does is that it tracks all your files - hard drives, flash drives, usb sticks, network drives&#x2F;shares - then it encrypts the files it finds.<p>The only way to unlock the files again is to pay $300 to get the key used for the encryption. The encryption used is RSA with a 2048 bit key which makes it extremely hard to crack, I&#x27;d say impossible with the time span and todays computers.<p>You have 72 hours before they trash the key making it impossible for you to get your data back.<p>This can be extremely devastating if you are running a business and all your files are gone. If you sync your files to the cloud, you&#x27;re still not safe, it syncs the encrypted files as well. If you are able to restore to previous versions of your files in the cloud - great.<p>Let your friends, family and co-workers know about this.<p>Here are some simple ways to avoid getting a virus in general:<p>1. Don&#x27;t open e-mails from people you don&#x27;t know<p>2. Don&#x27;t open attachments in e-mails unless you were waiting for the attachment<p>3. Don&#x27;t go to websites&#x2F;click links that you don&#x27;t fully trust<p>4. Don&#x27;t download and execute files that you don&#x27;t fully trust<p>It might seem obvious to the most of us to don&#x27;t do the above, but to a lot of friends, family and co-workers it might not be.<p>Imagine waking up and having to pay $300 to get your data back. However, the police tracked down one of the servers that serves the keys and shut them down which means the keys were not delivered and the data was lost, this means even if you do pay the $300, there is no guarantee that you will get the data back.<p>Raise awareness of this and avoid having your files lost.&quot;
评论 #6569059 未加载
评论 #6570186 未加载
ChuckMcMover 11 years ago
Central to the plot in the book Reamde but these guys don&#x27;t offer a &#x27;pay in WoW gold&#x27; choice.<p>Given the cost of computers these days, at least in business a separate &#x27;browsing&#x27; machine and &#x27;business&#x27; machine seems to be the best solution. I wonder if you could provide wireless for employees to bring their own laptops which had no &#x27;office&#x27; connectivity (but internet connectivity) and machines that were hard wired and MAC filtered to the &#x27;business&#x27; network.
alecover 11 years ago
Since the Bitcoin blockchain is public, couldn&#x27;t you follow the money? Make a list of all wallets that accepted these funds initially, and then do graph analysis, either to see where the money went or provide others with a tool to avoid transactions with those wallets?
评论 #6568527 未加载
评论 #6568448 未加载
评论 #6568682 未加载
ryan-cover 11 years ago
I&#x27;ve gotten a few copies of this, all to an email address that was only ever given out to AT&amp;T, and is not guessable.
评论 #6568330 未加载
PilateDeGuerreover 11 years ago
This scenario - minus the Bitcoins - was a plot device in Neal Stephenson&#x27;s &quot;Reamde&quot;.
gwernover 11 years ago
The only new thing about this ransomware is that the payment method is through Bitcoin, right?
评论 #6568107 未加载
评论 #6568115 未加载
scotty79over 11 years ago
I wonder if amount of $300 was determined via A&#x2F;B testing as optimal for bringing maximum profit.
评论 #6568416 未加载
DigitalSeaover 11 years ago
This is one of the scariest forms of attack on computing since viruses became prevalent in the nineties. The fact they were up until recently relatively undetectable adds another eerie dynamic to the situation. It highlights the aged old problem of people not pro-actively backing up their data offline until it&#x27;s too late. Go out and buy a couple of cheap 1tb external drives and back your data up now and keep doing it, there are even tools and drives that handle this automatically for you.<p>While ransomware isn&#x27;t anything new, the fact that the authors of such software are using currencies like Bitcoin make it that extra bit harder to track and stop these people from extorting data. I sense a new wave of ransomware is about to hit the scene now that Ars have revealed specifics about potentially making millions a year from such a racket. It&#x27;s hard informing people about these things without encouraging others to go and try writing their own ransomware and expect Bitcoin as payment.<p>This really worries me.
评论 #6571606 未加载
pkinnairdover 11 years ago
Called it in July. Read more...<p><a href="http://blog.kinnaird.us/the-coming-age-of-ransomware-cloud-services-meet-bitcoin/" rel="nofollow">http:&#x2F;&#x2F;blog.kinnaird.us&#x2F;the-coming-age-of-ransomware-cloud-s...</a>
grecyover 11 years ago
When I first saw the title, I thought it went like this:<p>1. Your machine is infected, and it encrypts everything it can.<p>2. The 72 hour countdown begins, and during that time your machine has been re-purposed to crunch BitCoins.<p>3. All you have to do is wait 72 hours, and everything will un-encrypt and uninstall, leaving you perfectly fine.<p>Creators profit by having millions of machines crunching BitCoins in their name.
评论 #6570763 未加载
mcphilipover 11 years ago
While I&#x27;d like to think I&#x27;m sophisticated enough about security to avoid this, it makes me concerned about the vast majority of people (e.g. my parents, my girlfriend) that are clueless about such dangers.<p>Are there any recommendations of a simple way to at least enable automated backups of local documents to the cloud on a windows box?
评论 #6568156 未加载
评论 #6568317 未加载
评论 #6568738 未加载
评论 #6568135 未加载
评论 #6568143 未加载
评论 #6570275 未加载
verytrivialover 11 years ago
This is the difference between crime and organised crime. People would not hand over the money to the burly visitors each month if their shop was burnt down anyway.<p>Evidence that paying the ransom actually results in the files coming back is the most troubling aspect here - these people are looking to establish a longer term criminal enterprise.
readmeover 11 years ago
I got a similar virus once but it was before bitcoin was popular. It just asked for money via credit card. The virus hid my files, and I needed them for work too.<p>Fortunately the virus did that by some filesystem driver level hack, because after I booted into Linux I was able to mount the partition and get my files back.
tbarbugliover 11 years ago
And than the police shut down the ransomware servers and dooms data from many infected victims to garbage, brilliant!
评论 #6568075 未加载
daveidover 11 years ago
The article didn&#x27;t mention, what systems does this ransomware primarily target? Is it cross-platform?
评论 #6567944 未加载
wentkenkoover 11 years ago
People on here are talking about attachments and being smart enough not to fall for sham downloads, but this isn&#x27;t how most of ransomeware is spread to its victims. They use exploit packs and 0 days. Visiting a website that&#x27;s been hijacked with an Iframe or a proxy that embeds an Iframe or any other data to the HTML that is returned could get you infected. There is no full proof way around this unfortunately.
habermanover 11 years ago
You could imagine the Bitcoin community deciding to blacklist any wallets to which funds like this were demanded and disbursed. That seems like a great idea until you then realize that this would be a way of denying anyone access to their own funds, by specifying their wallet as the recipient even though the attacker doesn&#x27;t control it. There really doesn&#x27;t seem to be any good countermeasure to this.
评论 #6568535 未加载
评论 #6568805 未加载
评论 #6568632 未加载
评论 #6569069 未加载
评论 #6568623 未加载
joeblauover 11 years ago
Wow what a scheme. I mean it&#x27;s almost the perfect situation for whoever wrote the system. It creates an extortion mechanism with a sense of urgency. Normally, users just carry malware around on their machine for weeks or months. The most frustrating part of this whole thing is that if you don&#x27;t get the private key back and you&#x27;re not backing up; you&#x27;re toast.
jasonlfunkover 11 years ago
&quot;you need to pay 300 USD &#x2F; 300 EUR &#x2F; similar amount in another currency&quot;<p>How about 300 VND? Seems similar to me. :)
bfellover 11 years ago
This happened to someone I know (really, it wasn&#x27;t me). Not only did it encrypt the local drives it also hit all of their network drives. As reprehensible as it is to pay the ransom they really had no choice since the encryption happened the prior night before the last backup.
dutchbritover 11 years ago
Our company was hit by this yesterday, caused a lot of issues. Thank god we had backups, but they were 2 days old (frustratingly enough, the backup failed the previous day - first time in months...)
revelationover 11 years ago
This is why a RAID setup is not a backup.
GillesB67over 11 years ago
For hacker having both an original file and the encrypted version that file should be relatively easy to retrieve the key? Especially if the virus XOR all or a part of the file. Otherwise a hacker may look at the random function that generate the key in the source code of the virus it may be weak and take values from the computer and time of infection.
howlettover 11 years ago
How is this any different from a virus that <i>wipes</i> (not just deletes) your data? It takes the same amount of time (actually wiping data would be faster) and the result is the same: No data.<p>Maybe the psychological part of &quot;Oh God the file is there but I can&#x27;t use it&quot; or the fact it&#x27;s ransomware?
spajusover 11 years ago
It&#x27;s a pity to see that Windows haven&#x27;t died off yet and things like this are still happening. Using Linux &#x2F; Mac for years, never looked back.<p>And for those who say &quot;my mother can&#x27;t use Linux&quot;, don&#x27;t be a cheapskate, get your loved ones a Mac - they will definitely know how to use it.
评论 #6569856 未加载
AsakiIssaover 11 years ago
I know a customer that got hit by this Tuesday morning. Unsurprisingly, Avast did nothing. I just told her the bad news and clean-installed Windows.<p>I have tried to find the private key with sample files, using known file byte headers, the public key and brute force on the private key. Sadly, no luck yet.
评论 #6569678 未加载
kbartover 11 years ago
I imagine that this combined with virus capabilities (so it can spread itself via network) would be an overkill. Strange that they didn&#x27;t do it, once you have an access to the local network (as soon as the initial victim runs .exe received by email) it shouldn&#x27;t be too hard.
foundloginover 11 years ago
Finally viruses are doing what they&#x27;re supposed to - wreck your computer instead of staying under the radar as long as possible. If people are motivated to protect themselves from this they&#x27;ll also be preventing botnets and doing good to the rest of the internet.
fmax30over 11 years ago
Huh , that is pretty scary add a physical packet snooper on all the traffic sent from my computer , it might be possible to mitm the private key as it is sent to the server. That way i might have a fighting chance against this.(if the traffic was unencrypted that is )
teteover 11 years ago
What I find funny is that this piece of software actually tells you more about what it does than software you pay money for and even uninstalls itself, after it is not needed anymore. It&#x27;s kinda weird how malware is better quality than most other software.
simonwover 11 years ago
I talked to a small shop owner just the other day that had been hit by this. They said they spent the $300 on a new PC instead - but I&#x27;m pretty sure they lost a bunch of irreplaceable data (mailing lists, supplier details etc). Pretty heart breaking.
评论 #6571310 未加载
phogsterover 11 years ago
Never heard of ransomware before, but the trend is alarming: <a href="http://www.google.com/trends/explore?q=ransomware#q=ransomware&amp;cmpt=q" rel="nofollow">http:&#x2F;&#x2F;www.google.com&#x2F;trends&#x2F;explore?q=ransomware#q=ransomwa...</a>
jpaliotoover 11 years ago
Nasty stuff. Fortunately for me, this would set off the &quot;why the heck are my fans running so loud right now&quot; alarm that I have in my head (that honestly, I wish I could turn off sometimes ... curse you trustedinstaller.exe!!).
abstractConceptover 11 years ago
Has anyone attempted to run this using Wine?<p>As long as you keep all drives (&#x2F; or ~&#x2F;) unmounted, I assume it would be `safe&#x27; to test it.<p>Might be a simpler environment to analyze CryptoLocker in, as apposed to a full Windows install.
评论 #6569106 未加载
coinover 11 years ago
&quot;When the receiver clicked on it, he saw a white box flash briefly on his screen but didn&#x27;t notice anything else out of the ordinary&quot;<p>What email client automatically unzips AND executes any containing .exe files?
Pxtlover 11 years ago
Well that&#x27;s moderately horrifying. I&#x27;ve dealt with ransomware before, but mostly it just used scary messages, not literally encrypting all your data.
评论 #6568348 未加载
anonymousover 11 years ago
Wouldn&#x27;t it be possible to attach a debugger to a running instance of the virus and extract the key while encryption is taking place?
评论 #6570366 未加载
评论 #6570441 未加载
评论 #6570616 未加载
swat535over 11 years ago
I have a question regarding this, does anyone know what happens if your data is already encrypted ? will it encrypt the encrypted files?
评论 #6572344 未加载
kalesoup11over 11 years ago
The wave of the future. Why break computers when you can just have the user pay you to avoid breaking it.
headShrinkerover 11 years ago
Is it the case that Mac OS default security setting would prevent an unsigned app like this from running?
roastyover 11 years ago
Disabling or limiting your use of JavaScript and Java in the browser will go a long way towards protecting against delivery of this as it is likely delivered by an exploit kit. If you do hit an exploit kit, Microsoft EMET (free) will probably mitigate the exploit&#x2F;s.
doubt_meover 11 years ago
How long will it take until the FBI gets rid of these guys?
评论 #6569978 未加载
gngealover 11 years ago
This is what Venti (of the Plan 9 fame) is for!
zalzaneover 11 years ago
It looks like the patent trolls have finally found their true calling.
__abcover 11 years ago
REAMDE
computerheadover 11 years ago
or dont use windows...
nvkover 11 years ago
Stop using Windows, is a good start.
评论 #6568216 未加载
nsxwolfover 11 years ago
Get a Mac.
评论 #6568064 未加载
sergiotapiaover 11 years ago
Who are the creators? Are the FBI going to take them to federal-pound-me-in-the-ass prison?