Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Detect CryptoWall on Win2k computers


  • This topic is locked This topic is locked
1 reply to this topic

#1 ssutton503

ssutton503

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:16 PM

Posted 29 January 2015 - 05:45 PM

We recently found some "Help_Decrypt" files on one of our file servers as well as files that seemed to be encrypted. From that we have deduced that we are the victims of CryptoWall 3.0. I have installed MalwareBytes on all computers on our network running XP or higher and have not found the source of the trouble. We have several computers running Windows 2000 or 2000 server which is not new enough for MWB. My question is, how can I detect the source of the problem. Removing would be another issue but for now, finding (and isolating) the source is critical. Is there any way to detect CryptoWall on a computer besides an anti-virus anti-malware program? Searcing for a Registry Key? Searching for a particular file? Anything?

 

Perhaps someone will also know the answer to this question -- Does CryptoWall copy itself to other computers? Do I need to worry about it spreading to other computers?

 

Thank you so much for any insight and help.



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,470 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 PM

Posted 29 January 2015 - 07:33 PM


A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0 is provided by Grinler (aka Lawrence Abrams), in this tutorial: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CryptoWall & CryptoWall 2.0 does and provide information for how to deal with it and possibly decrypt/recover your files. Cryptowall typically deletes all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore or using a program like Shadow Explorer...but it never hurts to try. At this time there is no fix tool and no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

CryptoWall 3.0 uses its new TOR gateways and has an extended deadline to pay the ransome...
see After a brief hiatus malware developers release CryptoWall 3.0.

There is also a lengthy ongoing discussion in this topic: CryptoWall - new variant of CryptoDefense Support & Discussion Topic.

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users