CryptoLocker industry: techniques, threats, realities, solutions and stakes.



In our fully-digital world, there is nothing nasty like seeing your valuable files, dossiers, video, photos and backups inaccessible, unavailable or impossible to decrypt.
With the sophistication and the proliferation of security threats and cybersecurity attacks, this reality is more and more aggressive.  
Ransomware is a particularly nasty piece of malware that takes, infected machines hostage.
In this context, CryptoLocker continues, successful to infect lot of computers and devices.
If unfamiliar, Connectikpeople.co, soon #Retinknow®, recalls that, CryptoLocker encrypts the files of computers it infected and then, demandes a ransom for a private key to decrypt those files.
Fox-IT and FireEye have established many of the private keys associated with CryptoLocker, and help us inter alia, understand the way that CryptoLocker works:
1.     CryptoLocker arrives on a victim’s machine through a variety of techniques such as spear-phishing emails or watering hole attacks.
2.     CryptoLocker then connects to randomly generated domain (via DGAs) to download a specific RSA public key.
3.     At that point, an AES-256 key is created for each file on the system.
4.     CryptoLocker then encrypts all of the supported files using the generated key from step 3.
5.     The generated key is then encrypted with the downloaded RSA public key from step 2.
6.     And finally, the AES-key is written to the beginning of the encrypted files, thus requiring the private key to decrypt.
It is clear that, there are several copycats and hybrid versions of Crytpolocker that exist, ranging from programs like CryptoDefense, PowerLocker, TorLocker and CryptorBit, to variants that are not necessarily named but have modified functionality, such as using Yahoo Messenger as a propagation technique.

Therefore, to help solve the problem of victims’ files still being encrypted FireEye and Fox IT developed a decryption assistance website and corresponding tool designed to help those afflicted with the original CryptoLocker malware. 

This means, Fox-IT and FireEye have established many of the private keys associated with CryptoLocker.  Having these private keys may allow for decryption of files that are encrypted by CryptoLocker.
However, certain files may not be decryptable; because new variants of CryptoLocker may be released at any time, and the tools available below, may not be able to decrypt files infected with these more recent variants.

https://www.decryptcryptolocker.com, is where you can upload an encrypted CryptoLocker file.  Based on this upload, the user will be provided with the option to download a private key that should decrypt their affected files. The site also provides instructions on how to apply this key to the files encrypted by CryptoLocker to decrypt those files.
Connectikpeople.co, soon #Retinknow®, recalls that, to use the site, simply upload an encrypted file. Enter your email address, to ensure the private key associated with the file is sent to the correct individual. 

Connectikpeople.co, soon #Retinknow®, can also observe that, the Decryptolocker.exe tool is designed to perform a few different types of functions.  Here are some examples of various prompts you can enter, depending on the result you would like to obtain.

1) If you would like to test a file if it is encrypted with CryptoLocker, you can enter:
Decryptolocker.exe –find File1.doc
2) If you would like to find all files encrypted with CryptoLocker in a directory, you can enter:
Decryptolocker.exe –find -r “C:\FolderName”
Note: Remember to include the “-r”
3) If you would like to decrypt a file encrypted with CryptoLocker, you can enter:
Decryptolocker.exe –key “<your private key provided in email>” File1.doc
4) If you would like to decrypt all files in a folder, you can enter:
Decryptolocker.exe –key “<your private key provided in email>” C:\FolderName\*
Note: Remember to include the “*” at the end
5) If you would like to decrypt all the files in a folder or drive recursively, you can enter:
Decryptolocker.exe –key  “<your private key provided in email>” -r C:\


Popular Posts