November, 2013 Blog archives

The CryptoLocker virus is spreading!!!

Published November 11, 2013

There’s a new type of malware that has been spreading like wildfire over the past couple of months called CryptoLocker. Most security researchers are claiming that this is one of the nastiest and most successful computer viruses ever: CryptoLocker is currently infecting Windows operating systems all across the United States and in other parts of the world. The virus is part of a generically named family of malware called “ransomware,” and its main function is to encrypt your files and “hold them hostage” until you pay a fee to have them decrypted.

How does CryptoLocker infect computers?

The CryptoLocker virus is passed around in emails that include attachments. The criminals send emails claiming to be from well-known companies like UPS, USPS, PayPal or FedEx in order to trick users in to thinking that they are legitimate and safe to open, but of course they aren’t safe at all. Instead, when a user attempts to open up the attachment, the computer becomes infected and the virus locks files on the system until the ransom request is paid. Most often the attachments will be disguised as JPEG images, ZIP files, PDF files and various types Microsoft Office files (mostly Excel and Word documents).

After a computer becomes infected, users are given 100 hours to pay a fee between $100 and $700 to get the files decrypted. The version of the virus that we’ve been seeing on infected machines have been asking $300 dollars for the decryption key. So far, it appears that the virus only encrypts data files with certain extensions, including Microsoft Office, OpenOffice and other documents, pictures, and AutoCAD files.

How to prevent your computer from becoming infected by CryptoLocker

The file paths that have been used by this infection and its droppers are:

  • C:\Users\\AppData\Local\.exe (Vista/7/8)
  • C:\Users\\AppData\Local\.exe (Vista/7/8)
  • C:\Documents and Settings\\Application Data\.exe (XP)
  • C:\Documents and Settings\\Local Application Data\.exe (XP)

In order to block the CryptoLocker and Zbot infections, certain Path Rules have to be implemented within the system so that they are not allowed to execute. There is a manual process to create these Software Restriction Policies easily, but thankfully a company called FoolishIT has created a utility called “CryptoPrevent” that automatically adds the appropriate series of Software Restriction Path Policies to a computer in order to prevent CryptoLocker and Zbot from being executed.

If you get an email that includes any type of attachment, use extreme caution and make sure you know who the sender is BEFORE opening it. If you don’t know who the sender is, or if it appears to be from one of the companies mentioned earlier DO NOT OPEN IT!!! Just delete the email. If you start seeing the CryptoLocker demand screen, please shutdown your machine immediately and call your IT administrator for further assistance. If you’re a current New River Computing client, please contact us ASAP if you see the CryptoLocker message on your screen.

Below is an example of what the CryptoLocker demand screen looks like.

Screenshot of CryptoLocker demand screen.

How to use the CryptoPrevent Tool

One important feature to make use of in CryptoPrevent is the option to whitelist any existing programs in %AppData% or %LocalAppData%. This is a useful feature as it will make sure the restrictions that are put in place do not affect legitimate applications that are already installed on your computer. To use this feature make sure you check the option labeled Whitelist EXEs already located in %appdata% / %localappdata% before you press the Block button.

Screenshot of CryptoPrevent tool.

It is available from the CryptoPrevent download page.

Once you run the program, simply click on the Block button to add the Software Restriction Policies to your computer. If CryptoPrevent causes issues running legitimate applications, then remove the Software Restriction Policies that were added by clicking on the Undo button.

More Information:

For a detailed analysis of the CryptoLocker virus please check out this excellent Bleeping Computer CryptoLocker article .

Detailed information on the CryptoPrevent tool developed by FoolishIT's CryptoPrevent page.

NRC is Now Offering CrashPlan Managed Backup Solutions!

Published November 06, 2013

Crashplan PROe continuous backup promotional image

Backups are arguably one of the most important things you can do to protect your important data.

Two of the biggest obstacles most users face with backups are:

  1. Complicated, confusing and unreliable backup software.
  2. Remembering to run it, or change the backup disc and take it offsite.

Who has time to deal with all of that hassle? Don’t worry, New River Computing can deal with the hassle FOR you!

We’ve spent a lot of time researching and testing numerous solutions to these problems and have found (what we consider to be) the best “cloud backup” file based backup solutions for our clients. What is this “Cloud Backup” you speak of? Well, if you’re asking this question, please check out the “Beginners Guide to Cloud Backup” before reading the rest of this post!

CrashPlan PROe isn’t ONLY a cloud-based backup solution, it is also a “hybrid” solution because it utilizes a multi-destination backup method. User data can be backed up to the cloud AND to external drives, local server shares or a NAS at the same time.

CrashPlan PROe runs silently in the background, continuously protecting the critical business data that lives on your machines. There’s no need for users to change their work habits because CrashPlan backs up data automatically, without any user effort or intervention required. New River Computing clients that use CrashPlan PROe enjoy significant productivity gains; it allows us to easily support the backup needs of thousands of clients, while enabling end users to quickly and easily restore data on their own.

It’s a great solution and we encourage all of our clients and users to contact us and give it a try!

Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.