Crypto Locker Malware – Act Now

By October 10, 2013thinkCSC Security Alert

cryptolockerRecently, several of our clients have been exposed to a new variant of malware which is becoming known as Crypto Locker. Antivirus vendors are working diligently to combat the virus. However, it is still possible for the malware to infect the machine even if it has current, up-to-date antivirus protection.

Crypto Locker specifically targets Word, Excel, PDF and possibly other file types. It encrypts the files and makes them unusable. Typically, a single machine (or more) on a network becomes infected. The malware proceeds to modify all of the specific files on that machine, as well as any files that machine has access to on its network, including mapped drives to shared servers. One infected machine can quickly spread, making nearly all company files stored on the network unusable.

On the machine that is actually infected, you will likely see a pop-up called CryptoLocker stating that your files have been encrypted and try to ransom you to pay hundreds of dollars to have them unencrypted.

thinkCSC would advise you to not pay them any money or give them any information.

It is unlikely that paying them will result in fixing your issue and this will likely result in fraud and other problems. It is important that these issues be reported as quickly as possible. The infected machine should be shut down and removed from the network.

On machines that are uninfected but trying to access files that have been changed by Crypto Locker, you may receive errors like ‘File is not in a recognizable format,’ ‘<Filename> cannot be opened because it is an unsupported filetype or has been damaged,’ and other variations of those messages.

The fix? In most cases, there is not one. The only tried and true solution, until Antivirus vendors are able to adapt, is to restore from backups. If you have an antiquated or untested backup system, possibly including tape backups, this could become quite problematic and lead to extensive downtime.

There are several lessons to learn from this. First, it is important to have a strong, automated backup solution that runs on a regular basis. Second, that backup solution should have monitoring and be tested on a regular basis. Third, point in time and time to restore need to be taken very seriously. If you only backup once day, you will likely lose an entire day or more of data should you need to restore. Time to restore is another important consideration. If you have to bring in tapes from offsite and then perform a restore, it will take longer before you and your data will be on working terms again. Fourth, it is always important to have currently licensed, updated Antivirus. This is a first line of defense and not a perfect solution that will stop 100% of all threats, so it is also important to have a complete protection system including email security, strong firewall, antivirus, and a comprehensive automated backup solution and patch management.

If you have been infected by this malware or would like to discuss thinkCSC’s Managed Services Program, Backup & Disaster Recovery (BDR) Solution, or any other concerns, please contact your account executive or contact us today.

thinkCSC

Author thinkCSC

More posts by thinkCSC

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.