Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Cryptoware issue


  • This topic is locked This topic is locked
4 replies to this topic

#1 AWS69

AWS69

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 07 May 2015 - 09:50 AM

This malware infected an old laptop that I was in the process of slowly decommisioning. Unfortunately before I could get all of the docs & pics I wanted to transfer from it I got this Ransomware malware that encryted everything...you know the effects.

 

I downloaded the 'decrypterfixer' which did successfully decrypt my pics. I should mention the old laptop is WinXP op system.

I downloaded the good pics onto a jump drive to copy to the new laptop, which is a Win 8 op sys and when I do so they are encrypted again, as if they were never repaired. If I look at the pics on the Win 8 system on this jump drive, they're encrypted. When I take that jump drive and stick it back in the XP laptop, they are perfect.

 

So the obvious question is, why is this happening?

 

BTW, no luck w/ decrypterfix on any of my .doc, excel or pdf files.

 

Any help greatly appreciated.



BC AdBot (Login to Remove)

 


#2 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:36 PM

Posted 07 May 2015 - 09:56 AM

Hi AWS69 :)

Do you know what Cryptoware you are infected with? Has your background been changed for a ransom note, do you have ransom note files (.txt, .bmp, .html) on your desktop, in your folders, etc. or anywhere else? If you have a ransom note, can you copy and paste its content here?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#3 AWS69

AWS69
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 07 May 2015 - 10:28 AM

Thank you for your reply.

 

Crytoware 3.0

 

Yes ransom notes eveywhere, have been deleting as i find them. Did a 'search' on C drive for all of them, there were hundreds but would not let me do a wholsale delete of them so still there.

 

I will get all the rest to you later this evening.

 

 

AWS69



#4 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:36 PM

Posted 07 May 2015 - 10:30 AM

You have been infected by Cryptowall 3.0 (if you meant Cryptowall and not Crytoware). Sadly, at this time, there's no way to decrypt the files that were encrypted by Cryptowall. There's currently a Support thread open for the Cryptowall infection. I suggest you to go post in it to seek assistance and ask your questions. This way, all the information about the Cryptoware will be centralized in one thread and it'll avoid having hundreds of them created for the same issue. The Support thread can be found in the link below.

CryptoWall - new variant of CryptoDefense

Also, Cryptowall runs a command that delete all the Shadow Volume Copy files stored on the system, which prevents you from recovering your files using the "Previous Versions" method. You can always check if you can, in case the command didn't run or didn't run properly. Shadow Explorer is a free program that you can use to navigate throught your shadow copies and can be easier to use in opposition to Windows' native explorer. Also, you can try to use free data recovery software to recover your files, but there's no guarantee that it'll work. Some of these free data recovery software are:Take in consideration that none of these software guarantee that they'll be able to recover everything, if not anything at all. Plus, since they are free software, they have a data recovery limit as well (ranging between 1 and 10GB).

In the future, if you want to prevent this type of infection (Cryptoware) from hitting you again, I suggest you to use one of the programs below to protect your system since they aim at stopping Cryptoware from infecting your system and/or the main process to encrypt your files, on top of having a good back-up plan in place.Meanwhile, if you want to learn more about Cryptowall: how you get infected, how you can prevent it from happening in the future, what methods you can use to try to restore your files, I suggest you to read the Cryptowall FAQ hosted on BleepingComputer.

CryptoWall and HELP_DECRYPT Ransomware Information Guide and FAQ

This being said, I contacted a Moderator to get this thread closed to avoid confusion.

Good luck!

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,593 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:36 PM

Posted 07 May 2015 - 02:48 PM

Yes ransom notes eveywhere, have been deleting as i find them. Did a 'search' on C drive for all of them, there were hundreds but would not let me do a wholsale delete of them so still there.

If you need individual assistance with malware removal, please follow the instructions in the Malware Removal and Log Section Preparation Guide. When you have done that, start a new topic and post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users