Feeds

Fiendish CryptoLocker ransomware: Whatever you do, don't PAY

Create remote backups before infection, advise infosec bods

Protecting against web application threats using SSL

'It may be possible to recover previous versions of the encrypted files'

The may be some hope of recovering previous versions of encrypted files but it's far better to avoid infection in the first place.

"In some cases, it may be possible to recover previous versions of the encrypted files using System Restore or other recovery software used to obtain 'shadow copies' of files," according to an advisory by anti-virus firm Malwarebytes.

More detailed advice on how some files might be recovered from infected machines can be found on borked PC advice website Bleeping Computer.

Another write-up of the threat can be found in a blog post by Trend Micro here.

Malwarebytes, Sophos (more info here) and other firms have added detection for strains of CryptoLocker to their antivirus products as well as blocking sites associated with the malware: factors that ought to provide some defence against infections taking hold.

However, antivirus technology can't help in recovering encrypted files post-infection.

The appearance of CryptoLocker reinforces the need to regularly back up personal data files. And local backups alone may not be enough. In some cases CryptoLocker may even attempt to attack backups located on a network drive connected to an infected PC. For this reason, a belt-and-braces approach featuring non-local and cloud-based backups becomes a sensible option.

Security experts agree that regular data backups are the best safeguard against potential calamity in the face of the threat.

Fabio Assolini, a senior security researcher at Kaspersky Lab, writes in a Twitter update."It's not possible to recover the files encrypted by CryptoLocker. It's not a good idea pay the ransom, backup is your friend."

Christopher Boyd, a senior threat researcher at ThreatTrack Security, concurred that recovery from backups is the best option: "There are only two real options (neither of which are particularly great).

"You can remove the virus but lose your files (unless you have them backed up), or pay the bad guys with a credit card to get the unlock code (assuming there even is one) to recover the locked data, then - one would assume - attempt to get the money back. Due to the potential complexity of the infection, email exchanges or even remote support may not be an ideal way to try to fix the problem."

A detailed discussion of the malware that took place around the time it first surfaced – in early September – can be found on a forum dedicated to kernel developers here. ®

CryptoLocker discussion video

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.