Cryptolocker ransomeware

If it doesn't fit elsewhere, it goes here
Post Reply
Baldape
Posts: 124
Joined: Wed Nov 24, 2010 9:43 pm

Cryptolocker ransomeware

Post by Baldape » Wed Sep 11, 2013 6:02 am

I just heard of a new type of ransomware called Cryptolocker and I doubt it could leak through SBIE, but I wonder if it's even possible for it to break through the sandbox? On that note if I understand correctly a system restore can undue it's encryption of your personal files, although I'm not a %100 sure about this.

Peter2150
Posts: 879
Joined: Tue Mar 27, 2007 9:46 pm
Location: Washington DC

Re: Cryptolocker ransomeware

Post by Peter2150 » Wed Sep 11, 2013 12:53 pm

Baldape wrote:I just heard of a new type of ransomware called Cryptolocker and I doubt it could leak through SBIE, but I wonder if it's even possible for it to break through the sandbox? On that note if I understand correctly a system restore can undue it's encryption of your personal files, although I'm not a %100 sure about this.
A while back I tested this type of ransomware. If it runs in the Sandbox what will happen is all the files will be encrypted, but the encrypted files will be in the sandbox, and the real ones will be fine. Empty the sandbox and the encrypted ones are gone.

Pete

Baldape
Posts: 124
Joined: Wed Nov 24, 2010 9:43 pm

Post by Baldape » Wed Sep 11, 2013 1:56 pm

Thanks Peter2150 for giving me some sense of relief :)
But it still begs the question is it possible for a system restore to undue the effects of the malware? :?:

Guest10
Posts: 5124
Joined: Sun Apr 27, 2008 5:24 pm
Location: Ohio, USA

Post by Guest10 » Wed Sep 11, 2013 4:16 pm

Baldape wrote:But it still begs the question is it possible for a system restore to undue the effects of the malware? :?:
I probably shouldn't say anything, since I'm not really familiar with these ransomware programs, but...
Assuming that you are referring to the System Restore that comes with Windows, then I would say no - it will not help in that situation.
System Restore makes backup copies of files that are deleted, not files that are changed.

Plus, it doesn't even back up all files -just a subset of the files. It depends a lot on the file extension and the folder where the files are located.
For example, folders like 'Temp' or 'Tmp' don't usually contain anything useful, and are always excluded by System Restore. There are also exclusions made on a file extension basis, where files with some extensions are not backed up by SR.
I don't know about Windows versions that are later than XP, but on XP there's a file "C:\WINDOWS\system32\Restore\filelist.xml" that tells System Restore what to include in its backup, and what to exclude.

A hard drive backup program will enable you to recover from ransomware - if you make backups to a different drive.
I use a 1 TB external USB drive for my backups.
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007

Baldape
Posts: 124
Joined: Wed Nov 24, 2010 9:43 pm

Post by Baldape » Wed Sep 11, 2013 8:49 pm

Guest10 wrote:
Baldape wrote:But it still begs the question is it possible for a system restore to undue the effects of the malware? :?:
I probably shouldn't say anything, since I'm not really familiar with these ransomware programs, but...
Assuming that you are referring to the System Restore that comes with Windows, then I would say no - it will not help in that situation.
System Restore makes backup copies of files that are deleted, not files that are changed.

Plus, it doesn't even back up all files -just a subset of the files. It depends a lot on the file extension and the folder where the files are located.
For example, folders like 'Temp' or 'Tmp' don't usually contain anything useful, and are always excluded by System Restore. There are also exclusions made on a file extension basis, where files with some extensions are not backed up by SR.
I don't know about Windows versions that are later than XP, but on XP there's a file "C:\WINDOWS\system32\Restore\filelist.xml" that tells System Restore what to include in its backup, and what to exclude..



Yeah I kinda had thought so :(, oh well what about third party options like AOMIE?




Guest10 wrote:A hard drive backup program will enable you to recover from ransomware - if you make backups to a different drive.
I use a 1 TB external USB drive for my backups.


By the way this nasty piece of ransomware is able to spread to any drives you have attached to your system at the time of the infection. :evil: :twisted:

Peter2150
Posts: 879
Joined: Tue Mar 27, 2007 9:46 pm
Location: Washington DC

Post by Peter2150 » Thu Sep 12, 2013 12:18 am

Baldape wrote:


By the way this nasty piece of ransomware is able to spread to any drives you have attached to your system at the time of the infection. :evil: :twisted:
Not if you block access to those drives via Sandboxie

Pete

Baldape
Posts: 124
Joined: Wed Nov 24, 2010 9:43 pm

Post by Baldape » Thu Sep 12, 2013 1:56 am

Peter2150 wrote:
Baldape wrote:


By the way this nasty piece of ransomware is able to spread to any drives you have attached to your system at the time of the infection. :evil: :twisted:
Not if you block access to those drives via Sandboxie

Pete



Wow even if you download and recover a file infected with this ransomware SBIE could block from accessing the external drive?

Peter2150
Posts: 879
Joined: Tue Mar 27, 2007 9:46 pm
Location: Washington DC

Post by Peter2150 » Thu Sep 12, 2013 7:56 am

Baldape wrote:
Peter2150 wrote:
Baldape wrote:


By the way this nasty piece of ransomware is able to spread to any drives you have attached to your system at the time of the infection. :evil: :twisted:
Not if you block access to those drives via Sandboxie

Pete



Wow even if you download and recover a file infected with this ransomware SBIE could block from accessing the external drive?
No, I didn't say that. If the infected file runs sandboxed, SBIE can block it from accessing other drives and/or folders. But if you recover it, which I assume means to take it out of the sandbox, then SBIE is out of the issue, UNLESS you run that program sandboxed, by right clicking it.

Pete

Guest10
Posts: 5124
Joined: Sun Apr 27, 2008 5:24 pm
Location: Ohio, USA

Post by Guest10 » Thu Sep 12, 2013 8:59 am

I guess it depends on when you get the infection, and how old your last hard drive backup is.

I try to make weekly backups, so hopefully I would only lose the previous weeks' changes if I had to restore my hard drive. There are backups from previous weeks too, but restoring one of them is not something that I would prefer to do.
Losing one weeks' work is bad enough, so I also keep a hand written log of important updates or uninstalls; paper printouts of product keys and serial numbers; and burn copies of some items to DVD-R.
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007

Baldape
Posts: 124
Joined: Wed Nov 24, 2010 9:43 pm

Post by Baldape » Thu Sep 12, 2013 1:09 pm

Peter2150 wrote:
Baldape wrote:
Peter2150 wrote: Not if you block access to those drives via Sandboxie

Pete



Wow even if you download and recover a file infected with this ransomware SBIE could block from accessing the external drive?
No, I didn't say that. If the infected file runs sandboxed, SBIE can block it from accessing other drives and/or folders. But if you recover it, which I assume means to take it out of the sandbox, then SBIE is out of the issue, UNLESS you run that program sandboxed, by right clicking it.

Pete






Sorry I misunderstood, it sounded kinda odd :lol: After all SBIE is not a Firewall but speaking of which I suppose a HIPS program could restrict access to external drives.

And this begs the question, whats the most typical way this type of malware downloads/installs itself? I mean if its a DBD then where all 'pretty much' in the clear. :)

Post Reply

Who is online

Users browsing this forum: No registered users and 1 guest