Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Encryption

Inside Cryptowall 2.0 Ransomware 181

msm1267 writes: If you need more evidence that ransomware is here to stay, and could turn into cybercriminals' weapon of choice, look no further than Cryptowall. Researchers at Cisco's Talos group have published an analysis of a Cryptowall 2.0 sample, peeling back many layers of known commodities around this threat, such as its use of the Tor anonymity network to disguise command-and-control communication. But perhaps more telling about the commitment around ransomware is the investment attackers made in its capabilities to detect execution in virtual environments, building in many stages of decryption present before the ransomware activates, and its ability to detect 32- and 64-bit architectures and executing different versions for each.
This discussion has been archived. No new comments can be posted.

Inside Cryptowall 2.0 Ransomware

Comments Filter:
  • by roccomaglio ( 520780 ) on Wednesday January 07, 2015 @08:23AM (#48753577)
    Cyptowall is very sophisticated. It will go into online backups and encrypt them too. If you are using a common online backup it can find those and encrypt those too. The best protection against this is a usb backup in a drawer. Cyptowall was recently being distributed by yahoo ads via a compromised flash ad http://news.yahoo.com/yahoo-ad... [yahoo.com]. You could have received it by going to your favorite news site.
    • by Anonymous Coward on Wednesday January 07, 2015 @08:34AM (#48753631)

      The best protection is to pull your backups not push. You have whatever is performing you backups connect into the machine, and then pull the backups, not having your machine being backed up connecting to the destination and pushing. That way, the machine can be compromised but it has no clue that it's even being backed up (since it's simply a share that's being used.) When you use a usb drive, you'll be safe, until someone plugs it into that machine not knowing that as soon as they do, it will begin encrypting what's accessible on that usb drive. I aways try to backup from outside of the context of what is being backed up. If it's a VM, I backup from the host, not from inside of the VM I need the data from. If it's a storage end point, I don't back up the files, I snapshot the volumes.

      It isn't always possible to do it that way, but doing it that way has saved my backside more than a few times.

      • by rvw ( 755107 ) on Wednesday January 07, 2015 @08:54AM (#48753697)

        The best protection is to pull your backups not push. You have whatever is performing you backups connect into the machine, and then pull the backups, not having your machine being backed up connecting to the destination and pushing. That way, the machine can be compromised but it has no clue that it's even being backed up (since it's simply a share that's being used.)

        Great and interesting, good to be aware of this possibiilty! But what if the machine that is pulling is infected? How do you know that is not happening?

        • by jiriw ( 444695 ) on Wednesday January 07, 2015 @09:21AM (#48753885) Homepage

          First, the machine pulling backups has completely different interaction with the 'world' than your average system-to-be-backed-up. I assume you're not reading e-mail, PDFs or surf the web on the system you use for data backup. Also, it should not execute any of the data it's backing up so the actual backup process should not be an attack vector for malicious software.

          If you still want more security you could choose for the machine pulling backups to actually have a different hard and/or software platform than the machines it pulls the backups from. For example, you could have windows desktops and shared SMB partitions that contain the stuff to be backed up and a Linux NAS with Samba client doing the backups using a cronjob. Make sure that, if the NAS does have Samba server as well (for network shares) your backups are not available through them because, as we know of Cryptowall, it will also encrypt network data the infected system have write access to.
          There is virtually no malicious software that can infect multiple distinctly different hard / software platforms in the same attack. Although in this particular instance (Cryptowall 2) it does make use of two processor architectures, x86 and AMD64 to do its things...

        • Most of the NAS drives out there have a Linux shell available. We rsync from there whenever possible, and the workstation or server does not have rights to the NAS box.

          Nothing is perfect, and the ransomeware might figure out ways to skirt these protections. It really comes down to defense in depth against different threats-- multiple types of backups. The concern I have now is out of space challenges once encryption starts.

          • Exactly. I've been doing the same for more than the last decade, except using a second workstation as the backup device (as opposed to NAS).

            If the backup machine is on the same LAN, I export the drive (or directories) to be backed up read-only, mount them on the backup read-only, and copy using rsync

            If the machine is in a different location, I share a key pair and pull what I want backed up using rsync (over ssh) from the backup machine

            This is fairly bulletproof, and in no way can anything running on the or

        • by raymorris ( 2726007 ) on Wednesday January 07, 2015 @10:56AM (#48754793) Journal

          We use two strategies. First, the backup device is ONLY a backup device. It doesn't have a web browser and it's not used for email. We use very large servers to backup our customer data, but on a small scale you could use a Raspberry Pi, an old router with OpenWRT, or a smart NAS. Because the device handling backups has no desktop or services, it shouldn't get infected. Access is strictly limited - either console only or strong ssh keys, perhaps through a VPN first. The backup device can be so restricted because it doesn't need to be useable for anything but pulling backups.

          Its access to the machines it backs up can also be extremely limited. The ssh key of the backup device is only allowed to run rsync with pull arguments. So even if the backup device were compromised, it can do no harm.

      • by Zocalo ( 252965 )
        I wouldn't think that the mechanism by which you perform your backups would make much difference to Cryptowall; how you manage and how long you retain them is far more likely to leave you with a safety net. Unless it gets caught in the act, once Cryptowall gets onto a PC, it encrypts the data first and only then makes its presence known to the victim, so if you've updated your backups in the meantime surely they're as good as useless, regardless of how they were taken? The only way backups might save you
        • Yes, having a backup set that predates infection is the only solution as far as I can see, regardless of how you back up your data.

          I have too much data (tens of thousands of photographs -- I do photography for a living) to "back up to a thumb drive". I back up to a regular Desktop hard drive, temporarily inserted into one of those USB "drive toasters". The drive is then marked with a sharpie and put away somewhere safe. Assuming I'm not infected at the time of backup, and I don't do something stupid like

      • by mlts ( 1038732 )

        That's the rub. The ideal is something like a NetBackup appliance that has deduplication on the backend, the capability for clientside and serverside encryption [1], and the ability for a backup process to go to the client and start snarfing data.

        However, unless one has $58,000.00 for a small NetBackup appliance, the only thing that comes even close is Retrospect, which is $2100 for multiple servers, around $1000 for one server. For maximum security, a dedicated, locked down PC is needed so no bad stuff c

        • Re: (Score:2, Informative)

          by Anonymous Coward

          I wouldn't be surprised to see this actually be a niche market, similar to NAS appliances.

          There is quite a lively backup appliance market. For example these [unitrends.com] can do pretty much everything you described.

          [1]: Yes, this kills deduplication... but there are some machines which need to be secured in case the backup appliance gets hacked.

          You are also completely right here, there is a constant battle between security and deduplication.

          Full Disclosure: Posting AC because I am a developer at Unitrends.

          • by mlts ( 1038732 )

            Interesting appliance offerings. The 312 and the other desktop model appear quite useful for almost everyone, if the price is right. Just the fact that malware can't go in and "rm -rf /" the device adds significant protection.

            The 312/313 look interesting. The $4000 price point isn't cheap, but trying to do something similar, like building a PC with Windows Server 2012 R2 and then finding an application to do the backups, may run into higher costs overall.

            IMHO, be it a Unitrends appliance, a machine runni

        • by tlhIngan ( 30335 ) <slashdot&worf,net> on Wednesday January 07, 2015 @11:09AM (#48755003)

          I wouldn't be surprised to see this actually be a niche market, similar to NAS appliances. A box that one plops down, configures, installs a client on Windows, OS X, or Linux, and can do the basic range of backups, be it files, or complete bare metal OS images. A file restore would be just accessing the backup client. A complete image restore could even be telling the appliance to map a USB port to a virtual bootable image, boot the machine via the USB port, and let the application code do the rest from there. That way, the machine is never on the network in a vulnerable state.

          Technically, Microsoft created one, then canned it, as usual.

          Windows Home Server contained an EXCELLENT network backup utility - it did image-based backups (but can do file-based restores easily), deduplication, is not accessible via SMB shares, fast, cheap, and a whole lot more. The only downside was it was Windows-only - it could only do NTFS disks because it relies on Volume Shadow Services and on disk-tracking (it finds out what actually changed on disk between runs so it only needs to backup the changed content).

          It was a great backup, restore and upgrade tool - the recovery program was a bootable CD, and the drivers it needs are stored with the backup so all you need is a USB thumbdrive, copy a specific folder off the machine's backup and use it with the boot CD so the boot CD can access hard drives and network.

          And it was automated - every night every machine would get backed up.

          But as is typical for Microsoft, they canned WHS and let the backup program in it die because well, it was too useful.

      • When you use a usb drive, you'll be safe, until someone plugs it into that machine not knowing that as soon as they do, it will begin encrypting what's accessible on that usb drive.

        Disk drives - hard, floppy, etc. - used to have a hardware write protect feature. (Switch, punched-notch, etc.) Set it and there was no way the stored content could be changed. A backup that you'd set would not be vulnerable to rewrite attacks when plugged into an insufficiently-cleaned machine to restore the files.

        Then drive

      • Chuck Norris backs up his computer to single-write BD-Rs. Then he roundkicks your face.

        I also do that, but not the face-kick part.

      • The best protection is to pull your backups not push.

        Or, it's a bit more expensive, but back up to a NAS/Server, and then back that up to something else. Like I back up to a NAS, which then performs backup to an external hard drive. Sure, a smart virus might figure out how to encrypt my NAS, but I can just restore that from backup. My computer doesn't have direct access to the NAS backups, so it can't encrypt them.

    • by rvw ( 755107 ) on Wednesday January 07, 2015 @09:00AM (#48753727)

      Cyptowall is very sophisticated. It will go into online backups and encrypt them too. If you are using a common online backup it can find those and encrypt those too. The best protection against this is a usb backup in a drawer.

      Cyptowall was recently being distributed by yahoo ads via a compromised flash ad http://news.yahoo.com/yahoo-ad... [yahoo.com]. You could have received it by going to your favorite news site.

      I use Crashplan. Couldn't they use a canary of some kind? In my online account I define a file that is just plain text or a key. I upload the text content of that file to my account while the local backup software doesn't know about this. I point to where this file is located in my backup, and it should be identical. Whenever this file is encrypted (or changed), I get an alert via mail. Then I know something is messing with my backup or with my local files.

    • by cdrudge ( 68377 ) on Wednesday January 07, 2015 @09:02AM (#48753747) Homepage

      Cyptowall was recently being distributed by yahoo ads via a compromised flash ad http://news.yahoo.com/yahoo-ad [yahoo.com].... You could have received it by going to your favorite news site.

      That article makes no mention of a compromised flash ad. It actually doesn't mention any type of compromise or flash. Yahoo ads served up an ad that took people to a server that could lead to a compromise. Just visiting a page that had that Yahoo ad didn't compromise your machine.

      • by account_deleted ( 4530225 ) on Wednesday January 07, 2015 @10:56AM (#48754805)
        Comment removed based on user account deletion
        • by bmo ( 77928 )

          It's these 3rd party ad server farms that get hacked and start serving out this shit. Doesn't matter if it's Yahoo, CNN, Drudge, MSNBC, Fox News...etc. If they have a contact with one of these ad agencies (and they all do), all it takes is for one of the infected servers to rotate into view for the end user. Really nasty stuff.

          This. So much this. And there are ad networks that will host anything given the right amount of money and lack of care. I sure as hell don't allow ad networks to display their cr

    • by drooling-dog ( 189103 ) on Wednesday January 07, 2015 @09:30AM (#48753959)

      Cyptowall was recently being distributed by yahoo ads via a compromised flash ad

      That's why my hosts file [mvps.org] includes these entries (among many others):

      127.0.0.1 count.3721.yahoo.com
      127.0.0.1 yahooads.valuead.com
      127.0.0.1 yahoo.nuggad.net
      127.0.0.1 agyahooag.112.2o7.net
      127.0.0.1 yahoo.ivwbox.de
      127.0.0.1 adserver.yahoo.com
      127.0.0.1 ae.adserver.yahoo.com
      127.0.0.1 au.adserver.yahoo.com
      127.0.0.1 cn2.adserver.yahoo.com
      127.0.0.1 hk.adserver.yahoo.com
      127.0.0.1 in.adserver.yahoo.com
      127.0.0.1 us.adserver.yahoo.com
      127.0.0.1 pn1.adserver.yahoo.com
      127.0.0.1 pn2.adserver.yahoo.com
      127.0.0.1 tw2.adserver.yahoo.com
      127.0.0.1 a.analytics.yahoo.com
      127.0.0.1 y.analytics.yahoo.com
      127.0.0.1 srv1.wa.marketingsolutions.yahoo.com
      127.0.0.1 srv2.wa.marketingsolutions.yahoo.com
      127.0.0.1 srv3.wa.marketingsolutions.yahoo.com
      127.0.0.1 advision.webevents.yahoo.com
      127.0.0.1 ts.richmedia.yahoo.com
      127.0.0.1 adjax.flickr.yahoo.com
      127.0.0.1 nz.adserver.yahoo.com
      127.0.0.1 sg.adserver.yahoo.com
      127.0.0.1 br.adserver.yahoo.com
      127.0.0.1 cmk.tw.yahoo.overture.com
      127.0.0.1 cn.adserver.yahoo.com
      127.0.0.1 tw.adserver.yahoo.com
      127.0.0.1 be.adserver.yahoo.com
      127.0.0.1 dk.adserver.yahoo.com
      127.0.0.1 eu-pn4.adserver.yahoo.com
      127.0.0.1 fr.adserver.yahoo.com
      127.0.0.1 nl.adserver.yahoo.com
      127.0.0.1 se.adserver.yahoo.com
      127.0.0.1 uk.adserver.yahoo.com
      127.0.0.1 de.adserver.yahoo.com
      127.0.0.1 es.adserver.yahoo.com
      127.0.0.1 gr.adserver.yahoo.com
      127.0.0.1 it.adserver.yahoo.com
      127.0.0.1 no.adserver.yahoo.com
      127.0.0.1 s.analytics.yahoo.com
      127.0.0.1 visit.webhosting.yahoo.com #[WebBug]
      127.0.0.1 geo.yahoo.com
      127.0.0.1 cm.tw.overture.com #[cm.tw.g.ysm.yahoo.com]
      127.0.0.1 cm.west.yahoo.overture.com
      127.0.0.1 cmh.tw.yahoo.overture.com
      127.0.0.1 cmx.tw.yahoo.overture.com
      127.0.0.1 ad.antventure.com #[any-world.ngd.ysm.yahoodns.net]
      127.0.0.1 ar.adserver.yahoo.com
      127.0.0.1 ca.adserver.yahoo.com
      127.0.0.1 cookex.amp.yahoo.com
      127.0.0.1 launch.adserver.yahoo.com
      127.0.0.1 mx.adserver.yahoo.com
      127.0.0.1 o.analytics.yahoo.com
      127.0.0.1 z.analytics.yahoo.com

      • Hosts is of dubious efficacy compared to an actual DNS server.

        Advantages:

        • Pattern matching (*.adserver.yahoo.com)
        • Works for all devices on the local network
        • You can use real DNSBLs
        • You can use real DNSWLs
        • You can combine whitelists and blacklists: deny *.yahoo.com; allow mail.yahoo.com
        • You can return NXDomain instead of a possibly-valid IP address
        • It's generally faster and more resource efficient than hosts

        APK is delusional and fundamentally doesn't understand DNS. Don't be APK.

        Hosts by default is cached in memory

    • Assuming a Windows shop with a Windows server holding the online backups, the worst that any client-side app can do is corrupt the current version of the networked backup. It can't delete the shadow copies. Oh, I suppose it could try to fill up the disk so the earlier non-corrupted shadow copies get purged, but it can't outright delete them unless it infects the server first (or otherwise gets admin access to the server).

      It also can't touch existing tape or other offline sever backups from an infected des

      • by jandrese ( 485 )
        Cryptowall specifically overwrites all shadow copies of files.
        • it deletes LOCAL VSS copies. He is talking about server based VSS, which if you have turned on would indeed give you a good recovery option.

        • Not always. I'm not sure if the Cryptowall authors are just incompetent, but it sometimes leaves the shadow copies intact. A user at work was hit with Cryptowall last year. There were no backups at that time, but I managed to recover nearly everything from shadow copy. Oddly, the malware also jumped to one of the shares, but left most of them untouched.
    • Done.

    • by gweihir ( 88907 )

      Indeed. A good backup is independent, and that decidedly includes "offline".

    • by antdude ( 79039 )

      Drawer? Connect = can infect.

  • Malware (Score:5, Interesting)

    by ledow ( 319597 ) on Wednesday January 07, 2015 @08:25AM (#48753585) Homepage

    Most malware is surprisingly benign. I've been saying it for years.

    If you wanted to get really nasty, you can do these kinds of tricks and the thing will be damn-near scary to contract.

    The problem is that we've bred a generation of people who see malware as nothing more than a distraction. Who will go to "uninstall" to remove it, thinking that's to be trusted, who don't realise that something running in the background is a problem once you close the advert it pops up.

    At some point, something like this is going to be combined with a handful of never-seen-before exploits and it'll go across the globe and take weeks before there are effective patches to get rid of it. But the scary part is that the first few seconds of infection are all that's needed to totally control your ability to use your computer and access your data.

    Maybe then we'll get proper application whitelisting / sandboxing by default in a desktop OS. And, hell, why do applications get the run of every file I use under my account? Should they not have to request such things first? Even on Unix-likes, if you get on as my user, you can trash all my data - why? Why is the data store not immutable and applications only get a link to the data IF they are allowed access to it? And thus nothing ever actually runs "as" the user, but only as its own separate user with similar permissions and only the files necessary.

    Malware could be a lot worse than even this. Why it isn't yet, I haven't figured out - I presume because money-making is at the heart of it now rather than actually malintent with your data. But that won't last forever.

    I'm sorry, but the very concept of a virus scan happening "at scheduled intervals" or after you've already double-clicked on the file just tells you that it's too late before you start. We've got away with it for decades in desktop OS, but it can't continue forever.

    Getting a virus on my networks scares the crap out of me. People think I overreact when I just remote-off the machine (or tell them to pull the plug) and just re-image for even the most basic of adware. Fact is, I didn't install it and I have no idea what it ACTUALLY does. And I'll be damned if it's going to get the chance to go on my shared areas and do anything, even with file history, backups, etc. available.

    • Comment removed (Score:4, Interesting)

      by account_deleted ( 4530225 ) on Wednesday January 07, 2015 @08:42AM (#48753661)
      Comment removed based on user account deletion
      • by 0123456 ( 636235 )

        For a start, an app like Facebook should only have read-only access to your photos. That still provides the opportunity to steal your naked pics and upload them all over the web, but not to delete them.

        Of course, if the malware is already using exploits to install, it may also be able to use exploits to escape any such protection.

        But this is now a huge problem, which needs to be fixed. The days when you could trust even supposedly legitimate software not to do bad shit with your shit are over. No software s

        • Comment removed based on user account deletion
          • by 0123456 ( 636235 )

            What if I want to save photos posted by a friend to my device?

            Then you can click a box saying 'yes, I really want to let this app save this file to this location'. Does the Facebook app even let you save other people's pictures?

            Alternatively, you can have a 'downloads' directory for the Facebook app, and map it into a 'photos' virtual directory so every app with access to the photos can see those downloaded from Facebook, but Facebook can't overwrite photos from any other app.

            Yes, people might have to learn not to save random files in random places, or put them all on

            • Comment removed based on user account deletion
              • by 0123456 ( 636235 )

                So you're going to use an annoying UAC-like pop-up that will rapidly be ignored by 99.9% of the population because it appears so often as to be nearly useless?

                UAC is useless, because all it tells you is 'Do you want to allow Hello Kitty screensaver to: write to hard disk'. That's it. May be perfectly legitimate, may not. You have absolutely no way of telling what it's actually doing, so clicking 'no' is pointless.

                Whereas if the Facebook app starts asking to write to protected parts of the disk when you're not saving anything, you know something is wrong.

            • Re:Malware (Score:5, Funny)

              by CreatureComfort ( 741652 ) on Wednesday January 07, 2015 @09:39AM (#48754035)

              people might have to learn

              Oh. I see your problem right there.

            • by mlts ( 1038732 )

              What about a photos directory in the FB app structure? If someone wants to upload a photo of their cat, just dragging and dropping it into that, then firing up FB to upload that isn't that much of a hindrance... and it will boost security by a large amount. Same with dropping a file into a subdirectory of a mail program, so the MUA doesn't have the ability to send attachments of every document present.

              Yes, it is one extra step, but it would help a lot with security.

          • What if I want to save photos posted by a friend to my device?

            On later versions of Mac OS X with entitlements, when you get a "Save File" dialogue, the window itself is running in a separate process from the app that called it and communicates with the client over IPC, so the client never actually is able to see the filesystem. When the user picks a save location, the window process hands an NSURL object back to the client, but this NSURL doesn't actually contain a valid

            file:///

            url, it contains a persi

      • don't allow your users to be admins on their local machines,

        Ding ding ding ding ding... whenever anyone came to me for malware-related help with Windows, I make sure that they no longer have admin privileges before I let them back in. Create a separated local admin account for them if necessary, but their everyday web-surfing and mail-reading account should not need admin privileges.

      • by cras ( 91254 )

        Maybe then we'll get proper application whitelisting / sandboxing by default in a desktop OS. And, hell, why do applications get the run of every file I use under my account? Should they not have to request such things first? Even on Unix-likes, if you get on as my user, you can trash all my data - why?

        The answer is functionality. Let's consider the example of Android, an OS with a fairly recent security model, built on top of Linux which provides for chroot. Why not put apps into their own chroot jail by default? Seems like a good idea, right? How do you explain to Grandma why she can't upload photos from her camera's image gallery to Facebook? Oh, you'll solve that problem by putting the photos in a public directory? Okay, that eliminates the functionality concern, but now you're right back where you started with exposure to ransomware....

        Not necessarily. This can be solved by having a standard privileged file open/save dialog that grants the access automatically to apps based on user input. Of course that limits the UI designs in some ways.. I wrote some ideas 11 years ago how something like this could be done. [iki.fi] Partially obsolete nowadays though but still could be doable (except for the web browser parts - web security seems to be a lost cause already). Perhaps once these kind of worse malwares start happening people would finally implement

    • In reading TFA, a prevention may be to add the Tor list into your hosts file so it cant download a Tor client to continue. Add the list into your router blacklist can be out of reach of the malware to bypass the block.

      In the arms race this is effective on the current version. An update may have a new list of Tor download locations.

      Not sure if blocking TOR at the router is possible or effective.

      • Re: (Score:2, Interesting)

        by Anonymous Coward

        In reading TFA, having an executable called VBoxService.exe or vmtoolsd.exe seems like a sure fire way to have it skip right over you, as it thinks you're running inside a VM.

    • Re:Malware (Score:5, Interesting)

      by Nite_Hawk ( 1304 ) on Wednesday January 07, 2015 @08:53AM (#48753693) Homepage

      Malware could be a lot worse than even this. Why it isn't yet, I haven't figured out - I presume because money-making is at the heart of it now rather than actually malintent with your data. But that won't last forever.

      I suspect it's because the powerful people in the world largely care little about computers, virsuses, downtime, etc. To them it's all just mysterious technical mumbo jumbo that is of little interest to them. Extortion is a little more clear though. Someone is trying to fuck them, and that tends to get people riled up. Riling up folks like us is one thing, but statistically speaking sooner or later malware like this will inadvertantly fuck someone who's capable of things like armed abduction, torture, and death. You have to have a lot of faith in the anononimity of bit torrent that you won't be found by one of these kinds of people.

    • And, hell, why do applications get the run of every file I use under my account? Should they not have to request such things first? Even on Unix-likes, if you get on as my user, you can trash all my data - why?

      Because anything else would require popping up numerous "would you like to allow this application to do $foo" boxes, and then you end up training the user to just hit "yes" on everything because it's too damned annoying to make a decision every time when the vast vast majority of access requests really are legitimate.

      Sandboxing based on applications making their own decisions and being relatively trustworthy might not be a bad plan though - i.e. if your web browser has an immutable list of files it needs ac

      • I don't see why you can't do more refined access than just granting everything to every program. Especially with the massive amounts of storage space and memory tha computers have today. Sandbox every application allowing it to only have full control over it's own little sandbox. If a program needs to look at stuff in other file structures then give it read access, not full control, to those directories. You want it to be able to write to files in those other directories, fine, it reads in a file it isn't a

        • If a program needs to look at stuff in other file structures then give it read access

          Great! $malware got read access to your bank details.

          You want it to be able to write to files in those other directories, fine, it reads in a file it isn't allowed to overwrite or change, and then saves it's own copy that it can molest in whatever way it wants.

          So now instead of having a single copy of the file, you have a separate copy saved by each application that has been used to process it - creating a mountain of almost-identical files that the user has to keep track of is not a user friendly way of doing things.

          Better is to have a versioned filesystem - each time a file is changed (by any application!) the delta is saved and the filesystem keeps the old data hidden away. Most of the time everything behav

          • by 0123456 ( 636235 )

            Better is to have a versioned filesystem - each time a file is changed (by any application!) the delta is saved and the filesystem keeps the old data hidden away.

            It's fortunate that disks are infinitely large, so the malware can't just overwrite the files multiple times until the filesystem deletes the plaintext versions.

    • by jythie ( 914043 )
      Why can we not get proper white listing or sandboxing? Look what happens when companies try to move that direction. Both Microsoft and Apple got hell for it every time they tried and ended up backing off. Chome and Mozzila are encountering similar problems as attempts break plug ins or websites that people use.

      Security issues are generally rare occurrences, while functionality one uses daily are immediately visible and annoying. Even within unix systems we see a constant push/pull between security and
    • Why is the data store not immutable and applications only get a link to the data IF they are allowed access to it?

      Because then somebody has to tell the computer which applications are allowed to access which data, and normal users can't be bothered.

      You know that we have such functionality now, right? All you have to do is use something like SELinux and set up the ACLs. But I doubt that even most people as security-conscious as you have actually spent the effort to use it.

      Malware could be a lot worse than ev

    • by mlts ( 1038732 )

      The biggest problem we have is that businesses have moved to SAN and cloud backups. Yes, that VNX replicating asynchronously with constant snapshots is a great way to handle "natural" dangers... but it doesn't take much to drop and zero out all LUNs presented to all machines, and the replication client will just propagate the changes. Same with a tier 2 NAS like a NetApp box or an Isilon. Even with cloud backups, it doesn't take much time to drop a vault or a container.

      There just isn't any thought put in

      • Of course, the replication/snapshots are great for recovering for certain types of disasters, but they shouldn't replace tape backups...that's simply an extension of the old "RAID is not a backup." Do you actually work at a shop that only does replication and no actual tape backups, or have your heard of such a business? If so, please let me know so that can make sure that I'm not affiliated with them in any way.
    • Should they not have to request such things first? Even on Unix-likes, if you get on as my user, you can trash all my data - why? Why is the data store not immutable and applications only get a link to the data IF they are allowed access to it?

      i.e. SELinux

  • by Anonymous Coward

    I shall stay on my quad G5 under Linux or the time being. The market is too small for them to try to attack my machine.
    Why didn't people realize that a single monoculture of CPU architecture (x86 in this case) would simplify the job of these guys. I've been clamoring against x86 monoculure ever since Apple became just another resale channel for Wintel clone hardware.
    Monoculture is bad, it has always been bad and will always be.

    • by jythie ( 914043 )
      Not sure why this got modded so badly, the AC makes a good point. though it is becoming less of one over the years.

      CPU monoculures did make attacks easier, and it is a shame alternatives are getting further and further out of the reach of the average (in terms of pocketbook) users. On the other hand, increasingly attacks do not depend on the underlying hardware and instead the layers on top of it, which depends on having a whole different stack all the way up and down in order to stop them.

      In the end tho
  • by gstoddart ( 321705 ) on Wednesday January 07, 2015 @08:50AM (#48753685) Homepage

    How is this crap spread?

    Can I laugh at the people who have Flash enabled and let arbitrary sites run javascript? Or does this spread through some other vectors I don't know about?

    I suspect the problem is the idiots who write websites, who demand your browser run in the most insecure possible configuration so you can see their ads and other shit they've hidden behind code which needs to run on your browser.

    And I've always said I'm not willing to run my browser wide open just to make web sites work, because these things have been security holes for years.

    Browsers need to be a whole lot less trusting, and not default to just running any old thing which comes along. And certainly stop trusting scripts from 3rd parties and running whatever crap pile of Flash comes along.

    Unfortunately, users are used to seeing pages which give you detailed directions for re-enabling javascript and cookies.

    So to all you web developers out there who have ever written that page ... fuck you, you slimy bastard. It's partly your fault the internet is a shit hole.

    • by njnnja ( 2833511 )

      Although developers encourage this kind of thing by using flash and requiring javascript to display content, there is plenty of blame for users too. Heaven forbid a page might refresh! Users are demanding that websites look and feel like native applications, and the way to do that is to run things client side, like a native application does. Users want shiny shiny, regardless of the problems it causes.

    • by kriston ( 7886 )

      In a case I was recently troubleshooting, the vector was an advertisement popup that asked the user to click to download and install an Adobe Flash Player update.

      The user downloads it and runs it. Then it runs quietly in the background with the same privileges as the current user.

      I feel the need to reiterate here that Cryptowall does NOT require privilege escalation. If you happen to be a local administrator it will ask for it so it is able to delete shadow copies and Restore Points, but it does not need

  • by hackertourist ( 2202674 ) on Wednesday January 07, 2015 @09:09AM (#48753791)

    My backups are done on a USB harddisk that's connected to the media server on my home network. Switch the HD on, and it'll appear and backups can be made.

    How can I prevent malware from changing my backups? Would it be possible/effective to mount the drive as write-only, making it impossible to change existing files?

    • Would it be possible/effective to mount the drive as write-only, making it impossible to change existing files?

      Given the type of backup you are perform (a "push"), there is nothing you can do to prevent an active infection from destroying your backups while the HD is mounted. In theory, a backup to a blind drop may provide some protection, but there is no backup solution that I am aware of that will work without read access to at least its own metadata. Perhaps a developer opportunity?

      • Re: (Score:2, Redundant)

        by rHBa ( 976986 )
        As mentioned above, you need a PULL backup solution so the back-up is done by a remote server logging into your machine and taking copies of the files that need to be backed up rather then your machine connecting to a remote server and sending the files. That way your computer has no knowledge of where its backups are stored so cryptowall won't be able to find them either.

        In a Linux or Mac environment this would be simple to set up with common tools, You could write a sample BASH script that runs daily on
    • by Rashdot ( 845549 )

      I believe that they leave executable files alone, so maybe it's as simple as adding ".exe" to all your backup files? And removing any double ".exe" strings when retrieving?

  • Versioning (Score:5, Interesting)

    by jd142 ( 129673 ) on Wednesday January 07, 2015 @09:44AM (#48754077) Homepage
    A lot of people have been talking about backups and the fact that even your backups can be compromised. And that's true. The solution is versioning and rotation. If I'm compromised today, the files on Crashplan will be uploaded as encrypted files. But since they have versioning, I can go back 30 days or so and get the older versions. I may lose some data depending on how long I've been infected, but I'll be able to get some data back. The only other solution is to run a daily/weekly/monthly backup scheme that keeps your monthly backups for a year (or longer if you are really paranoid). It means you need 5 separate disks for each week and then another 12 for each month, which most people aren't going to want to do. Eventually the ransomware people will get patient and encrypt your files but allow access for 3-6 months before telling you.
    • Re:Versioning (Score:4, Insightful)

      by Pichu0102 ( 916292 ) on Wednesday January 07, 2015 @09:50AM (#48754117) Homepage Journal

      This works until you realize the ransomware could go into your Crashplan settings and turn off versioning and keeping deleted files.

      • Unless it requires two-factor confirmation to change settings, like a verification code sent by text message.

      • How are they going to authenticate to modify my cloud backup services, without my passwords?

        I mean, in theory, once Cryptowall hits my machine, they could send 100 ninjas to destroy all of my DLTs...

        • Re: Versioning (Score:4, Insightful)

          by Pichu0102 ( 916292 ) on Wednesday January 07, 2015 @12:38PM (#48756209) Homepage Journal

          In theory, it could stop the Crashplan service, manually edit your backup set settings to have no versioning, and no deleted file keeping, restart the Crashplan service, and let it run through and prune all the files it thinks it should be pruning, then encrypt your files, let it back them up, and Crashplan dutifully prunes the old versions like the hijacked config file says to.

    • This.

      I change take the backup media every day and take it home with me. At one site, I have thirty (3) external USB drives.

      At another, I can only keep two weeks of daily backup to take offsite. It's a law firm and I have schooled them that we are not bound by law to retain lots of stuff, but we are bound by law to give up anything we have.

    • Eventually the ransomware people will get patient and encrypt your files but allow access for 3-6 months before telling you.

      That isn't quite how this ransomware works. It isn't encrypting and decrypting your files on the fly, it encrypts your files so you can't use them. What you're suggesting is much more complex and opens up many more opportunities for defeating the malware--for instance, the decryption key would have to be stored on the infected machine.

  • There is a place in research labs for "true" virtualization/emulation, where a particular hardware environment is virtualized/emulated right down to the timing characteristics of the hardware it's pretending to be.

    Obviously you can't do this with stock hardware - you'll probably have to use supercomputer-type hardware and do large chunks of it in an emulator but in principle and maybe in practice we should able to emulate at least a few mid-2000s motherboard/CPU/typical-other-hardware setups well enough to

  • I suspect most backup software on the computer pushes the backups to a network share somewhere that I suspect these ransomware packages go looking for and encrypt those files as well.

    What if the backup system was remote and pulled the data from a network share on the client. If the client is infected, the infection cannot get to the backup file locations because they are not shared.

    I realize this is not trivial for average users to setup, but I'm exploring this option for my home network. Setup NAS type ser

  • Does the ransomware only work on Windows machines, or can it also affect *NIX/Mac/Android operating systems?
    • by mlts ( 1038732 )

      Right now, Windows... but I wouldn't be surprised to see it on OS X and UNIX operating systems since it would be quite easy to write. It would be simple to write a shell script that fetched a public key from key servers, did a find command, passed the output to PGP or gpg to encrypt files, then wipe the old .doc files.

      At least with UNIX, there are programs like amanda and bacula which can be used in client/server mode so that malware on a client can't touch the backup server and its data.

  • Wouldn't one way to stop it be to fake being a virtual machine? I'm sure that would start a cat & mouse game as they make their VM detection algorithm more sophisticated, but I'm thinking the faking code would be easier to write than the detection code.
  • Around 1% of RSA keys are easily broken, meaning you could decrypt your data without paying the ransom. This is because about 1% of keys are weak in one way or another. I wonder about the key generation function this malware uses. If they are using one of the weaker algorithms to generate keys, many victims may be able to decrypt fairly easily.

    • by hduff ( 570443 )

      Around 1% of RSA keys are easily broken, meaning you could decrypt your data without paying the ransom. This is because about 1% of keys are weak in one way or another. I wonder about the key generation function this malware uses. If they are using one of the weaker algorithms to generate keys, many victims may be able to decrypt fairly easily.

      Please check with the NSA about this strategy.

  • Does anyone know if it aims to encrypt all your files quickly or over a time period to increase the chance of poisoning backups?

    If the former, one mitigation might be to check file types on the backup? Assuming you do a backup to a different architecture, such as Linux, check file types - is a jpeg really a jpeg? Can it read plain text files? As soon as it finds one it can't, flag it up for investigation. Perhaps have a number of canary files, pull those first each time and compare them to known good copies

  • Please provide your email address [1] and an encrypted file [2] that has been encrypted by CryptoLocker. This portal will then email you a master decryption key along with a download link to our recovery program that can be used together with the master decryption key to repair all encrypted files on your system. [decryptcryptolocker.com]

    Found it at this site. [yahoo.com]

    Reputable security firms Fox-IT and FireEye collaborated on the free DecryptoLocker project, which provides a simple way for CryptoWall victims to recover their files and their privacy.

    Disclaimer: I read this stuff but I know nothing more than that.

  • The article says that the malware works by creating temporary .exe files in the folder specified by the %appdata% environment variable. Eg "C:\Documents and Settings\[username]\Application Data". As does numerous other malware.

    FoolishIT's "Cryptoprevent" utility uses Windows' "Software Restriction Policies" to try and stop .exe files from running in the %appdata% location. It is a good idea so for what it's worth, here's the URL: https://www.foolishit.com/vb6-... [foolishit.com]

news: gotcha

Working...