Quantcast
CTB Locker (Cryptolocker copycat) - Beyond.ca - Car Forums
Results 1 to 10 of 10

Thread: CTB Locker (Cryptolocker copycat)

  1. #1
    Join Date
    Oct 2009
    Location
    Unknown
    Posts
    1,157
    Rep Power
    0

    Default CTB Locker (Cryptolocker copycat)

    Have any other techs or IT's been seeing a lot of this ransom ware lately?

    I've known about Cryptolocker and its variants since their inception, but have never actually come across it. Yet, I'm now on my fourth one in the last couple of weeks.

    BTW-System Restore is the quickest and easiest way to remove the infection, but the files will still remain encrypted.

  2. #2
    Join Date
    Mar 2009
    Location
    Calgary
    My Ride
    '18 Murano
    Posts
    676
    Rep Power
    22

    Default

    We banned .zip attachments at the mail server, and put in a GPO to prevent executables running in the user's temp environment. So far that's prevented any ransomware (fingers crossed).

    What's been the delivery method of the ones you're seeing?

  3. #3
    Join Date
    Mar 2009
    Location
    Calgary
    My Ride
    '18 Murano
    Posts
    676
    Rep Power
    22

    Default

    Blocking .zip files at the server has prevented about 4 crypto files inbound as fake resumes, which seems popular lately.

  4. #4
    Join Date
    Oct 2009
    Location
    Unknown
    Posts
    1,157
    Rep Power
    0

    Default

    The investigators say the infection is "most likely" transmitted via a zip attachment, but that doesn't seem to be the case in the examples I've seen. All four customers claim they didn't open any attachment.

    With further questioning, I discovered that all four had generic infections just prior to the ransomware infection. But, they either ignored the infections temporarily, or tried to remove them on their own (unsuccessfully of course).

    So it seems in my cases, the ransomware is a result of the current infections being used as a catalyst to download and install the ransomware infection, or, in the process of trying to remove the generic infections themselves, they just made it worse (as usual).

  5. #5
    Join Date
    Oct 2009
    Location
    Unknown
    Posts
    1,157
    Rep Power
    0

    Default

    The fourth that I just cleaned is going back today. There's a lot of pictures and needed docs that are encrypted and not backed up.

    I gave her the details of the de-encryption process, and she plans on proceeding with that.

    My bet is she is going to lose a few hundred dollars.

  6. #6
    Join Date
    Mar 2014
    Location
    Airdrie
    Posts
    30
    Rep Power
    0

    Default

    FWIW I got this last night.

    Was working on the home computer trying to fix a "weird networking issue". The day consisted of installing and removing various virus scanners, and taking backups in anticipation of a re-install. Computer was under heavy load and acting sluggish, but this wasn't unexpected given my activity.

    I have backups up the wazoo, so although I have many hours ahead of me of identifying and restoring corrupted files, this isn't catastrophic.

    Files on my desktop, and a thumbdrive were hit. Network shares from my NAS were not.

    If I'd had the windows feature "Restore previous versions" of files enables, it would have made the recovery much much easier.

    But all told, I think I got off easy. No idea where I got it, or how long its been there.

    Also found the same infection on my laptop, but removed it before it did any damage. I think it waits a bit before doing its nasty trick.

    Moral of the story: KEEP OFFLINE BACKUPS.

  7. #7
    Join Date
    Aug 2011
    Location
    Strathmore
    My Ride
    2005 Dirtymax
    Posts
    2,222
    Rep Power
    22

    Default

    Originally posted by Robin Goodfellow
    FWIW I got this last night.

    Was working on the home computer trying to fix a "weird networking issue". The day consisted of installing and removing various virus scanners, and taking backups in anticipation of a re-install. Computer was under heavy load and acting sluggish, but this wasn't unexpected given my activity.

    I have backups up the wazoo, so although I have many hours ahead of me of identifying and restoring corrupted files, this isn't catastrophic.

    Files on my desktop, and a thumbdrive were hit. Network shares from my NAS were not.

    If I'd had the windows feature "Restore previous versions" of files enables, it would have made the recovery much much easier.

    But all told, I think I got off easy. No idea where I got it, or how long its been there.

    Also found the same infection on my laptop, but removed it before it did any damage. I think it waits a bit before doing its nasty trick.

    Moral of the story: KEEP OFFLINE BACKUPS.
    Backups are fine but you need to not introduce this into your environment which either you or someone else did.

  8. #8
    Join Date
    May 2006
    Location
    Calgary
    Posts
    806
    Rep Power
    19

    Default

    Anyone seen this hit a mac at all? Out of nowhere my mac is running incredibly slow and it seems to be after some crazy hard to close type pop-ups hit when browsing last week. I ran a full scan with Sophos and it came back clean but I'm not convinced something isn't happening in the background.

    Do you these things essentially just work in the background encrypting random files and then at some point have all your files encrypted and show you the ransom message?

  9. #9
    Join Date
    Oct 2009
    Location
    Unknown
    Posts
    1,157
    Rep Power
    0

    Default

    The Cryptolocker type infections haven't been written for Macs (yet).

    Are you still getting the popups? If so, try Adware Medic:

    http://www.adwaremedic.com/index.php

    If that doesn't help, there's a couple of things we can try.

    BTW- The Cryptolocker type infections don't encrypt random files. It encrypts files that are important to the user such as Pictures and Documents. Otherwise, yes, that's basically how it works.

  10. #10
    Join Date
    Nov 2004
    Location
    Calgary NE
    Posts
    702
    Rep Power
    20

    Default

    So both my home desktop and laptop got infected over the weekend. I'm not sure how, but somebody gained access to my TeamViewer account, transferred the ransomware, and ran it remotely.

    Luckily, the majority of my files were backed up to my NAS. I should keep my Windows locked when I'm away. >_>

Similar Threads

  1. Decryription keys for Cryptolocker.

    By Seth1968 in forum Computers, Consoles, and other Electronics
    Replies: 0
    Latest Threads: 01-05-2015, 10:25 AM
  2. US police department pays $750 CryptoLocker Trojan ransom demand.

    By Seth1968 in forum Computers, Consoles, and other Electronics
    Replies: 3
    Latest Threads: 11-24-2013, 10:32 PM
  3. FS: SportChek and Foot Locker Gift cards

    By domrebel in forum Miscellaneous Buy/Sell/Trade
    Replies: 0
    Latest Threads: 02-06-2007, 07:55 PM
  4. FS: Foot Locker Gift Card $105.99

    By vtec4life in forum Miscellaneous Buy/Sell/Trade
    Replies: 0
    Latest Threads: 12-14-2006, 01:59 AM
  5. FS: Ikea Locker Unit *SOLD*

    By The Cosworth in forum Miscellaneous Buy/Sell/Trade
    Replies: 3
    Latest Threads: 08-15-2006, 07:05 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •