Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-19 Thread Joe User
This is a great time to reinforce the need to do backups. Since it's a 
sensitive thing - you need to judge how to deliver the news but it's 
critical. Now more than ever before.


Couple of things. I'd save the data - LATER you might be able to get the 
drive unlocked. Don't allow them to waste the money on the unlock. The 
way I understand it, it's infrequent that they actually unlock it. In 
fact, by now the point at which they could be contacted might have been 
already shut down or compromised (more likely) by other 'hackers'. Just 
do not give in to paying. Better to wait. JMHO.


I got lucky with a client that got hit with this, about a year earlier I 
really was adamant that they get into some sort of automated backup. 
They took an online (sorry, CLOUD) backup that I was able to resell. It 
paid for itself FOUR times over (so far)! Anyway, sorry for you & client



On 7/18/2018 3:00 PM, Thane K. Sherrington wrote:
I know someone with no backups who recently had his entire computer 
encrypted with the .arrow variant of Dharma (.cezar Family).  (BTW, this 
isn't me.)


There is apparently no way to decrypt without paying the ransom or 
recovering deleted files.


So two questions:

1)Does anyone know if the ransomware encryption encrypts the file to a 
new file, then deletes the old one (giving me the possibility of deleted 
file recovery)?  If so, what software is recommend for an Windows NTFS 
system (so far, Recuva and R-Studio have found squat).


2)If he decides to pay the ransom and take his chances, what are legit 
sites to purchase bitcoin (never done that before)?


T





Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-19 Thread Scott Sipe
My office was hit by this exact same kind of attack. It came in through RDP
over a nonstandard port. Started encrypting a multi-terabyte network share
before I physically pulled the plug. Luckily had a backup from 24h before.
Lesson: RDP exposed anywhere on the internet is NEVER safe. All covered
with VPN and IP restrictions now.

Sigh.

Scott

On Wednesday, July 18, 2018, lopaka polena  wrote:

> I do use RDP frequently but never through default ports. Bummer there's no
> way to fix it without paying and no guarantee even if you pay. I still do
> hardcopy backups onto blu-ray discs at times because I can't afford to lose
> certain things to NAS failure or malware
>
> lopaka
>
> On Wed, Jul 18, 2018 at 5:14 PM, Thane K. Sherrington <
> th...@computerconnectionltd.com> wrote:
>
> > There are a whole bunch of free decryptors available, but not for this
> > variant.  Basically, when the criminal group gets taken down, often they
> > get the key and then the AV company makes a freeware program for people.
> > Very nice of them.
> >
> > Some useful pages I've found during this mess:
> >
> > https://id-ransomware.malwarehunterteam.com/index.php
> >
> > https://heimdalsecurity.com/blog/ransomware-decryption-tools/
> >
> > T
> >
> >
> > On 18-Jul-18 6:50 PM, lopaka polena wrote:
> >
> >> https://support.kaspersky.com/viruses/utility
> >>
> >> Never tried any of these but did read an article where they tested some
> of
> >> these and were able to recover some users files
> >>
> >> lopaka
> >>
> >> On Wed, Jul 18, 2018 at 2:30 PM, Winterlight <
> winterli...@winterlight.org
> >> >
> >> wrote:
> >>
> >> )Does anyone know if the ransomware encryption encrypts the file to a
> new
> >>>
>  file, then deletes the old one (giving me the possibility of deleted
>  file
>  recovery)?  If so, what software is recommend for an Windows NTFS
>  system
>  (so far, Recuva and R-Studio have found squat).
> 
>  I am surprised it encrypted the entire drive. Everything I have read,
> or
> >>> been told it involved the user files. I have never heard of a single
> >>> instance where the victim was able to recover their files without the
> >>> key.
> >>> I have read about people who pay up but still don't get the key which
> >>> didn't surprise me. Even large companies, hospitals, and government
> >>> agencies have been unable to overcome this, and usually pay up. I bet a
> >>> lot
> >>> of IT employees loose there jobs over being so unprepared to deal with
> >>> this.
> >>>
> >>> 2)If he decides to pay the ransom and take his chances, what are legit
> >>>
>  sites to purchase bitcoin (never done that before)?
> 
>  I have read that the ransom note often tells the victim how to go
> about
> >>> getting and transferring bit coin. Which make a lot of sense given that
> >>> bit
> >>> coin is so esoteric and most of the victims are naive about basic PC
> >>> stuff.
> >>> I have also heard of bit coin machines in places like NYC.There are
> legit
> >>> banking sites on line to do this... I would Google it. I understand
> that
> >>> I
> >>> think it is Citibank that now deals with bitcoin.
> >>>
> >>> Sorry I don't have the answers you are looking for and too bad they
> can't
> >>> put these criminals in prison for a very long time.
> >>>
> >>>
> >>
> >
> >
> >
>


Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread lopaka polena
I do use RDP frequently but never through default ports. Bummer there's no
way to fix it without paying and no guarantee even if you pay. I still do
hardcopy backups onto blu-ray discs at times because I can't afford to lose
certain things to NAS failure or malware

lopaka

On Wed, Jul 18, 2018 at 5:14 PM, Thane K. Sherrington <
th...@computerconnectionltd.com> wrote:

> There are a whole bunch of free decryptors available, but not for this
> variant.  Basically, when the criminal group gets taken down, often they
> get the key and then the AV company makes a freeware program for people.
> Very nice of them.
>
> Some useful pages I've found during this mess:
>
> https://id-ransomware.malwarehunterteam.com/index.php
>
> https://heimdalsecurity.com/blog/ransomware-decryption-tools/
>
> T
>
>
> On 18-Jul-18 6:50 PM, lopaka polena wrote:
>
>> https://support.kaspersky.com/viruses/utility
>>
>> Never tried any of these but did read an article where they tested some of
>> these and were able to recover some users files
>>
>> lopaka
>>
>> On Wed, Jul 18, 2018 at 2:30 PM, Winterlight > >
>> wrote:
>>
>> )Does anyone know if the ransomware encryption encrypts the file to a new
>>>
 file, then deletes the old one (giving me the possibility of deleted
 file
 recovery)?  If so, what software is recommend for an Windows NTFS
 system
 (so far, Recuva and R-Studio have found squat).

 I am surprised it encrypted the entire drive. Everything I have read, or
>>> been told it involved the user files. I have never heard of a single
>>> instance where the victim was able to recover their files without the
>>> key.
>>> I have read about people who pay up but still don't get the key which
>>> didn't surprise me. Even large companies, hospitals, and government
>>> agencies have been unable to overcome this, and usually pay up. I bet a
>>> lot
>>> of IT employees loose there jobs over being so unprepared to deal with
>>> this.
>>>
>>> 2)If he decides to pay the ransom and take his chances, what are legit
>>>
 sites to purchase bitcoin (never done that before)?

 I have read that the ransom note often tells the victim how to go about
>>> getting and transferring bit coin. Which make a lot of sense given that
>>> bit
>>> coin is so esoteric and most of the victims are naive about basic PC
>>> stuff.
>>> I have also heard of bit coin machines in places like NYC.There are legit
>>> banking sites on line to do this... I would Google it. I understand that
>>> I
>>> think it is Citibank that now deals with bitcoin.
>>>
>>> Sorry I don't have the answers you are looking for and too bad they can't
>>> put these criminals in prison for a very long time.
>>>
>>>
>>
>
>
>


Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread Thane K. Sherrington
There are a whole bunch of free decryptors available, but not for this 
variant.  Basically, when the criminal group gets taken down, often they 
get the key and then the AV company makes a freeware program for 
people.  Very nice of them.


Some useful pages I've found during this mess:

https://id-ransomware.malwarehunterteam.com/index.php

https://heimdalsecurity.com/blog/ransomware-decryption-tools/

T

On 18-Jul-18 6:50 PM, lopaka polena wrote:

https://support.kaspersky.com/viruses/utility

Never tried any of these but did read an article where they tested some of
these and were able to recover some users files

lopaka

On Wed, Jul 18, 2018 at 2:30 PM, Winterlight 
wrote:


)Does anyone know if the ransomware encryption encrypts the file to a new

file, then deletes the old one (giving me the possibility of deleted file
recovery)?  If so, what software is recommend for an Windows NTFS system
(so far, Recuva and R-Studio have found squat).


I am surprised it encrypted the entire drive. Everything I have read, or
been told it involved the user files. I have never heard of a single
instance where the victim was able to recover their files without the key.
I have read about people who pay up but still don't get the key which
didn't surprise me. Even large companies, hospitals, and government
agencies have been unable to overcome this, and usually pay up. I bet a lot
of IT employees loose there jobs over being so unprepared to deal with this.

2)If he decides to pay the ransom and take his chances, what are legit

sites to purchase bitcoin (never done that before)?


I have read that the ransom note often tells the victim how to go about
getting and transferring bit coin. Which make a lot of sense given that bit
coin is so esoteric and most of the victims are naive about basic PC stuff.
I have also heard of bit coin machines in places like NYC.There are legit
banking sites on line to do this... I would Google it. I understand that I
think it is Citibank that now deals with bitcoin.

Sorry I don't have the answers you are looking for and too bad they can't
put these criminals in prison for a very long time.









Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread Thane K. Sherrington
Thanks Lopaka.  This appears to have been a hack through an open RDP 
port - there's a lesson there somewhere... :)


T

On 18-Jul-18 5:16 PM, lopaka polena wrote:

Coinbase for bitcoin purchase. I always keep an offline backup (2nd NAS -
only booted up once a month or so to copy important stuff and kept
off/unpowered the rest of the time) just in case I ever get hit with one of
these, but running through linux firewall and good malware software has
kept me safe so far.

lopaka







Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread lopaka polena
https://support.kaspersky.com/viruses/utility

Never tried any of these but did read an article where they tested some of
these and were able to recover some users files

lopaka

On Wed, Jul 18, 2018 at 2:30 PM, Winterlight 
wrote:

>
> )Does anyone know if the ransomware encryption encrypts the file to a new
>> file, then deletes the old one (giving me the possibility of deleted file
>> recovery)?  If so, what software is recommend for an Windows NTFS system
>> (so far, Recuva and R-Studio have found squat).
>>
>
> I am surprised it encrypted the entire drive. Everything I have read, or
> been told it involved the user files. I have never heard of a single
> instance where the victim was able to recover their files without the key.
> I have read about people who pay up but still don't get the key which
> didn't surprise me. Even large companies, hospitals, and government
> agencies have been unable to overcome this, and usually pay up. I bet a lot
> of IT employees loose there jobs over being so unprepared to deal with this.
>
> 2)If he decides to pay the ransom and take his chances, what are legit
>> sites to purchase bitcoin (never done that before)?
>>
>
> I have read that the ransom note often tells the victim how to go about
> getting and transferring bit coin. Which make a lot of sense given that bit
> coin is so esoteric and most of the victims are naive about basic PC stuff.
> I have also heard of bit coin machines in places like NYC.There are legit
> banking sites on line to do this... I would Google it. I understand that I
> think it is Citibank that now deals with bitcoin.
>
> Sorry I don't have the answers you are looking for and too bad they can't
> put these criminals in prison for a very long time.
>


Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread lopaka polena
There was a freeware coinvault decrypter from kaspersky that hardocp talked
about way back when. I don't know if it would work for that variant.

lopaka

On Wed, Jul 18, 2018 at 2:30 PM, Winterlight 
wrote:

>
> )Does anyone know if the ransomware encryption encrypts the file to a new
>> file, then deletes the old one (giving me the possibility of deleted file
>> recovery)?  If so, what software is recommend for an Windows NTFS system
>> (so far, Recuva and R-Studio have found squat).
>>
>
> I am surprised it encrypted the entire drive. Everything I have read, or
> been told it involved the user files. I have never heard of a single
> instance where the victim was able to recover their files without the key.
> I have read about people who pay up but still don't get the key which
> didn't surprise me. Even large companies, hospitals, and government
> agencies have been unable to overcome this, and usually pay up. I bet a lot
> of IT employees loose there jobs over being so unprepared to deal with this.
>
> 2)If he decides to pay the ransom and take his chances, what are legit
>> sites to purchase bitcoin (never done that before)?
>>
>
> I have read that the ransom note often tells the victim how to go about
> getting and transferring bit coin. Which make a lot of sense given that bit
> coin is so esoteric and most of the victims are naive about basic PC stuff.
> I have also heard of bit coin machines in places like NYC.There are legit
> banking sites on line to do this... I would Google it. I understand that I
> think it is Citibank that now deals with bitcoin.
>
> Sorry I don't have the answers you are looking for and too bad they can't
> put these criminals in prison for a very long time.
>


Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread Winterlight



)Does anyone know if the ransomware encryption 
encrypts the file to a new file, then deletes 
the old one (giving me the possibility of 
deleted file recovery)?  If so, what software 
is recommend for an Windows NTFS system (so far, 
Recuva and R-Studio have found squat).


I am surprised it encrypted the entire drive. 
Everything I have read, or been told it involved 
the user files. I have never heard of a single 
instance where the victim was able to recover 
their files without the key. I have read about 
people who pay up but still don't get the key 
which didn't surprise me. Even large companies, 
hospitals, and government agencies have been 
unable to overcome this, and usually pay up. I 
bet a lot of IT employees loose there jobs over 
being so unprepared to deal with this.


2)If he decides to pay the ransom and take his 
chances, what are legit sites to purchase bitcoin (never done that before)?


I have read that the ransom note often tells the 
victim how to go about getting and transferring 
bit coin. Which make a lot of sense given that 
bit coin is so esoteric and most of the victims 
are naive about basic PC stuff. I have also heard 
of bit coin machines in places like NYC.There are 
legit banking sites on line to do this... I would 
Google it. I understand that I think it is 
Citibank that now deals with bitcoin.


Sorry I don't have the answers you are looking 
for and too bad they can't put these criminals in 
prison for a very long time. 



Re: [H] Ransomware, File Recovery, Bitcoin, Oh My!

2018-07-18 Thread lopaka polena
Coinbase for bitcoin purchase. I always keep an offline backup (2nd NAS -
only booted up once a month or so to copy important stuff and kept
off/unpowered the rest of the time) just in case I ever get hit with one of
these, but running through linux firewall and good malware software has
kept me safe so far.

lopaka



On Wed, Jul 18, 2018 at 1:00 PM, Thane K. Sherrington <
th...@computerconnectionltd.com> wrote:

> I know someone with no backups who recently had his entire computer
> encrypted with the .arrow variant of Dharma (.cezar Family).  (BTW, this
> isn't me.)
>
> There is apparently no way to decrypt without paying the ransom or
> recovering deleted files.
>
> So two questions:
>
> 1)Does anyone know if the ransomware encryption encrypts the file to a new
> file, then deletes the old one (giving me the possibility of deleted file
> recovery)?  If so, what software is recommend for an Windows NTFS system
> (so far, Recuva and R-Studio have found squat).
>
> 2)If he decides to pay the ransom and take his chances, what are legit
> sites to purchase bitcoin (never done that before)?
>
> T
>
>
>
>


RE: [H] Ransomware

2006-04-17 Thread Mesdaq, Ali
We were the first to discover Ransomware :-) way back about half a year
or more ago

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Winterlight
Sent: Monday, April 17, 2006 4:27 PM
To: hardware@hardwaregroup.com
Subject: [H] Ransomware


http://www.foxnews.com/story/0,2933,187845,00.html

Computer Virus Demands Ransom for Encrypted Files
Wednesday, March 15, 2006
By Ryan Naraine

Virus hunters have discovered a new Trojan that encrypts files on an 
infected computer and then demands $300 in ransom for a decryption
password.

The Trojan, identified as Cryzip, uses a commercial zip library to store

the victim's documents inside a password-protected zip file and leaves 
step-by-step instructions on how to pay the ransom to retrieve the
files.

It is not yet clear how the Trojan is being distributed, but security 
researchers say it was part of a small e-mail spam run that successfully

evaded anti-virus scanners by staying below the radar.

While this type of attack, known as ransomware, is not entirely new,
it 
points to an increasing level of sophistication among online thieves who

use social engineering tactics to trick victims into installing malware,

said Shane Coursen, senior technical consultant at Moscow-based
anti-virus 
vendor Kaspersky Lab.

The LURHQ Threat Intelligence Group, based in Chicago, was able to crack

the encryption code used in the Cryzip Trojan and determine how the
files 
are encrypted and the payment mechanism that has been set up to collect
the 
$300 ransom.




According to a LURHQ advisory, Cryzip searches an infected hard drive
for a 
wide range of widely used file types, including Word, Excel, PDF and JPG

images.
Once commandeered, the files are zipped and overwritten by the text: 
Erased by Zippo! GO OUT!!!
The Trojan then deletes all the files, leaving only the encrypted file
with 
the original file name, followed by the _CRYPT.ZIP extension.
A new directory named AUTO_ZIP_REPORT.TXT is created with specific 
instructions on how to use the E-Gold online currency and payment system
to 
send ransom payments.

The instructions, which are marked by misspellings and poor grammar, 
contain the following text: Your computer catched our software while 
browsing illigal porn pages, all your documents, text files, databases
was 
archived with long enought password. You can not guess the password for 
your archived files - password lenght is more then 10 symbols that makes

all password recovery programs fail to bruteforce it (guess password by 
trying all possible combinations).

The owner of the infected machine is warned not to search for the
program 
that encrypted the data, claiming that it simply doesn't exist on the
hard 
drive.

If you really care about documents and information in encrypted files
you 
can pay using electonic currency $300, the note says. Reporting to
police 
about a case will not help you, they do not know password. Reporting 
somewhere about our E-Gold account will not help you to restore files.
This 
is your only way to get yours files back.

The Trojan author uses scores of E-Gold accounts simultaneously to get 
around potential shutdowns, according to LURHQ, which published the 
complete list of E-Gold accounts in the advisory.

Officials from E-Gold, which operates out of the Caribbean island of
Nevis, 
were not available for comment.
Infection reports are not widespread, so it is not believed this is a
mass 
threat by any means, LURHQ said.
However, the company said social engineering malware is typically more 
successful when it is delivered in low volume to get around anti-virus 
detections.
[M]ore attention means the likely closing of the accounts used for the 
anonymous money transfer, LURHQ said.