{"id":709,"date":"2016-04-14T09:43:03","date_gmt":"2016-04-14T07:43:03","guid":{"rendered":"https:\/\/www.em-soft.si\/myblog\/elvis\/?p=709"},"modified":"2016-05-03T15:24:29","modified_gmt":"2016-05-03T13:24:29","slug":"cryptolocker","status":"publish","type":"post","link":"https:\/\/em-soft.si\/myblog\/elvis\/?p=709","title":{"rendered":"Cryptolocker&#8230;"},"content":{"rendered":"<p><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Everyone of us want to stop Cryptolocker and similar programs. It seems that it is really a nightmare for all admins. Anyway, to stop Cryptolocker and any unwanted program, you have to be aware, that this will bring limitations to your system, which are not always welcome.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">How does Cryptolocker work?<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> We have 5 phases of Cryptolocker infections:<\/span><\/p>\n<ol>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Installation: The software is delivered to your computer via download or E-Mail attachment and the user click on it. The executable is now installed, the registry keys are set and we are ready to go to the next phase.<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Contacting headquarters: the computer is contacting criminal headquarters for registration, so it will prepare all environment for phase 3.<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Creating keys: headquarter and client are now identifying each other and are ready to \u201chandshake\u201d and create two keys for encryption.<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Encryption: Cryptographic keys are now established and the encryption can begin. It depends on version, but almost all files on all local and shared drives where you have permissions will be encrypted.<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Extortion: The screen with a guide how much and where to pay is displayed. There is displayed also how much time you have for payment. If you will not pay in time, the headquarter key will be deleted and you will not be able to decrypt files. The payment is every day higher \u2013 so if you want to pay, do it immediately.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">To prevent a large number of unwanted software, the first step to do is always <strong>remove LocalAdmin permissions and turn on UAC<\/strong>. This two actions will put you in situation where user will not be able to install any application and write to system crucial folders. Also have your system always up to date. And I don\u2019t mean only OS, but include all applications installed (we know attacks to Java, Adobe FlashPlayer, Microsoft Office\u2026).<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> Of course this is not enough as a lot of bed guys know how to elevate permissions or are using different folders (for example AppData is used for Cryptolocker), but been a LocalAdmin is a great way to become a victim. I suggest to all home users and system administrators to use two different accounts \u2013 one for daily use and the second for administrator tasks.<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> Well, the real way to prevent Cryptolocker is blocking the execution of exe files in AppData folder. You can do this with group policy in AppLocker or in software restriction policy. This are steps for basic protection with AppLocker:<\/span><\/p>\n<ol>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Create new GPO for Cryptolocker prevention<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Edit new created GPO<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Expand <em>Computer configuration &gt; Policies &gt; Windows Settings &gt; Security settings &gt; System Services<\/em><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Enable \u201c<strong><em>Application Identity<\/em><\/strong>\u201d service and set it to automatic startup mode<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=713\" rel=\"attachment wp-att-713\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-713 aligncenter\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto1-300x216.png\" alt=\"Crypto1\" width=\"300\" height=\"216\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto1-300x216.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto1-768x553.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto1.png 788w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Go down to <em>Application Control Policies<\/em> and expand to <em><strong>AppLocker<\/strong><\/em><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">In \u201c<em><strong>Configure role enforcement<\/strong><\/em> enable <em><strong>Executable rules<\/strong><\/em> and make them in <em>Enforce mode<\/em> (I suggest you, to run them in Audit mode for week or two and analyze logs before enforcing them \u2013 just to find legal applications which can be blocked)<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=714\" rel=\"attachment wp-att-714\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-714\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto2-300x241.png\" alt=\"Crypto2\" width=\"300\" height=\"241\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto2-300x241.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto2-768x618.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto2.png 914w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Expand <em>AppLocker<\/em> and click to <em>Executable rules<\/em><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Right click in action pane and <em>create Default Rules<\/em><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Right click in action pane and create <em>New Rule<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=715\" rel=\"attachment wp-att-715\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-715\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto3-300x243.png\" alt=\"Crypto3\" width=\"300\" height=\"243\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto3-300x243.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto3-768x621.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto3.png 912w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/em><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">In Permissions on <em>Action<\/em> set Allow for Everyone<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=716\" rel=\"attachment wp-att-716\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-716\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto4-300x192.png\" alt=\"Crypto4\" width=\"300\" height=\"192\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto4-300x192.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto4-768x493.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto4.png 1004w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">In <em>Conditions<\/em> select that is Publisher rule<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=717\" rel=\"attachment wp-att-717\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-717\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto5-300x193.png\" alt=\"Crypto5\" width=\"300\" height=\"193\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto5-300x193.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto5-768x494.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto5.png 1002w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">In <em>Publisher<\/em>, just browse one file (in my case was Internet Explorer) and go with slider up to Any publisher<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=718\" rel=\"attachment wp-att-718\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-718\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto6-300x194.png\" alt=\"Crypto6\" width=\"300\" height=\"194\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto6-300x194.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto6-768x496.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto6.png 999w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Give the name to the rule<a href=\"https:\/\/em-soft.si\/myblog\/elvis\/?attachment_id=712\" rel=\"attachment wp-att-712\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-712\" src=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto7-300x193.png\" alt=\"Crypto7\" width=\"300\" height=\"193\" srcset=\"https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto7-300x193.png 300w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto7-768x494.png 768w, https:\/\/em-soft.si\/myblog\/elvis\/wp-content\/uploads\/2016\/04\/Crypto7.png 1002w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/li>\n<\/ol>\n<p><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">So, this is about AppLocker, but we have still a lot of work to do. There is a big surface for attack if users are local admin. To prevent this, configure Restricted groups in GPO by using <em>Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security settings &gt; Restricted Groups<\/em>.<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> Apply this GPO to all computers and the first step is done.<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> GPO is a good way to prevent Crypto, but be aware that Crypto is evolving and you have to evolve with him. And preventing Crypto with GPO means that executable is already in your system \u2013 maybe you have to prevent it before is downloaded or received with mail. For this step you will need the application firewall, good antivirus in file system and in mailing system.<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> But still you can do something with chip devices with closing outgoing ports 83, 846, 777, 997, 1604, 9001, 9003, 444, 9052, 8443, 7777, 9003 and 25254. This ports are used to communicate with headquarter servers to obtain a certificate for encryption (maybe exist also other ports or will be added \/ changed during the time). If you will close this ports, the system will not be able to retrieve a certificate for encryption and the encryption will not be able to begin. Be careful on notebooks because the users will bring their notebooks at home and the encryption will be successful.<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> As you can see, there are a lot of ways to prevent Cryptolocker, but you have to prevent it. When you have it, it is too late \u2013 think about it now!<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">And for home users? Well we cannot forget them. They have a lot of pictures and documents on their computers \u2013 practically a whole life and is a really big impact to lose all this material.<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> I suggest you a software from <a href=\"https:\/\/www.foolishit.com\/\" target=\"_blank\">FoolishIT<\/a>. It is free and it is working good (but if you want to keep it up to date, give those few Euros to the author \u2013 he is doing his job well!).<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 12pt; font-family: times new roman,times,serif;\">Additional reading:<\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/01\/13\/crowti-update-cryptowall-3-0\/\" target=\"_blank\">https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/01\/13\/crowti-update-cryptowall-3-0\/<\/a> <\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> <a href=\"http:\/\/www.crowdstrike.com\/blog\/4-0-another-brick-in-the-cryptowall\/\" target=\"_blank\">http:\/\/www.crowdstrike.com\/blog\/4-0-another-brick-in-the-cryptowall\/<\/a><\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> <a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2015\/02\/analysis-cryptowall-3-0-dyre-i2p\/\" target=\"_blank\">http:\/\/researchcenter.paloaltonetworks.com\/2015\/02\/analysis-cryptowall-3-0-dyre-i2p\/<\/a><\/span><br \/>\n<span style=\"font-size: 12pt; font-family: times new roman,times,serif;\"> <a href=\"https:\/\/tools.cisco.com\/security\/center\/viewAlert.x?alertId=36338\" target=\"_blank\">https:\/\/tools.cisco.com\/security\/center\/viewAlert.x?alertId=36338<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyone of us want to stop Cryptolocker and similar programs. It seems that it is really a nightmare for all admins. Anyway, to stop Cryptolocker and any unwanted program, you have to be aware, that this will bring limitations to your system, which are not always welcome. How does Cryptolocker work? We have 5 phases [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,7,1,13,15],"tags":[17,39,34,28,40],"class_list":["post-709","post","type-post","status-publish","format-standard","hentry","category-essentials-server","category-management","category-uncategorized","category-windows","category-windows-server","tag-essentials-server-2","tag-windows","tag-windows-10","tag-windows-8","tag-windows-server"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=709"}],"version-history":[{"count":3,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts\/709\/revisions"}],"predecessor-version":[{"id":719,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=\/wp\/v2\/posts\/709\/revisions\/719"}],"wp:attachment":[{"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/em-soft.si\/myblog\/elvis\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}