SlideShare a Scribd company logo
Understanding
CryptoLocker
(ransomware) with a
Case Study
Who Am I..?
Forensics Investigator
M.Tech (Information Security) in 2014, IIIT – Delhi
Former Intern at CIRT-India.
Interest : Any type of Cyber Forensics
Email : adarshagarwal91@gmail.com
LinkedIn : https://www.linkedin.com/in/adarshagarwal91
Disclaimer
• Entire analysis is done on individual basis.
• The information in this presentation and opinion are mine
alone and do not reflect those of my current employer.
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Ransomware
(CryptoLocker)
Cryptolocker
Cryptolocker
Cryptolocker
CryptoLocker a.k.a Ransomware
• CryptoLocker is a ransomware Trojan.
• Believed to have first been posted to the Internet on 5 September 2013.
• Smart enough to travel across your network and encrypt any files
located on shared network drives.
• Uses AES-265 or RSA public-key cryptography, with the private key
stored only on the malware's control servers.
CryptoLocker a.k.a Ransomware
• After Encryption, displays a message and popup which offers to
decrypt the data if payment is made within stated deadline, and
threatened to delete the private key if the deadline passes.
• Ransomwares generally has a 48-72 hour deadline which, once
passed, causes the ransom to increase or leads to key deletion.
• Most ransoms start in the $100-$500 area or 0.5 BTC to 4 BTC.
• 1 BTC = $ 430 (approx.) = 28600 INR.
Symptoms
• You suddenly cannot open normal files and get errors such as
the file is corrupted or has the wrong extension.
• An alarming message has been set to your desktop background
with instructions on how to pay to unlock your les.
• The program warns you that there is a countdown until the
ransom increases or you will not be able to decrypt your les.
• A window has opened to a ransomware program and you cannot
close it.
• You have files with names such as HOW TO DECRYPT FILES.TXT
or DECRYPT_INSTRUCTIONS.HTML
Symptoms
You see a files similar to:
• %PUBLIC% desktophelp_restore_files_<random text>.html
• %PUBLIC% desktoprestore_files_<random text>.txt
• %PUBLIC% documentshelp_restore_files _<random text>.txt
• %PUBLIC% documentsrestore_files_<random text>.html
• %PUBLIC% favoritesrestore_files_<random text>.html
• %PUBLIC% favoritesrestore_files_<random text>.txt
• CryptoLocker.lnk
• HELP_TO_DECRYPT_YOUR_FILES.TXT
• HELP_TO_DECRYPT_YOUR_FILES.BMP
• HELP_TO_SAVE_FILES.bmp
• HELP_TO_SAVE_FILES.txt
• key.dat
• log.html
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
Cryptolocker
CryptoLocker Propagation
• Propagate via
phishing emails
unpatched programs
compromised websites
online advertising
free software downloads
Prior existing Botnet
Droppers file Path
• The file paths that have been used by this infection and its
droppers are:
• C:Users<User>AppDataLocal<random>.exe (Vista/7/8)
• C:Users<User>AppDataLocal<random>.exe (Vista/7/8)
• C:Documents and Settings<User>Application Data<random>.exe (XP)
• C:Documents and Settings<User>Local Application
Data<random>.exe (XP)
This ransomware can
search for files in all of
the folders with the
following extensions and
then encrypt them
Excluded directories, filenames & extensions
Source: Sophos
Variants of CryptoLocker
• TeslaCrypt
• Cryptowall
• Torrent Locker
• CTB-Locker
• CryptoVault
• PowerShell based
• Locky
• Ransom32 ( JavaScript based)
• Petya (Encrypts MBR)
• Many many more…
Cryptolocker
In 2016 (Jan to Mid April)
Week 2 – May, 2016
• May 9th 2016 - CryptXXX 2.0
• May 9th 2016 - The Enigma Ransomware (Russian)
• May 10th, 2016 - The Shujin Ransomware (Chinese)
• May 11th, 2016 - GNL Locker (German Netherlands Locker)
• May 12th, 2016 - CryptoHitman ( Jigsaw v2)
• May 12th, 2016 - Crypren Ransomware
• May 12th, 2016 - Mischa Ransomware (Petya variant)
• May 13th, 2016 - Offering Ransomware as a Service
• May 13th, 2016 - Decryptor for CryptXXX Version 2.0
May 9th 2016 - CryptXXX 2.0
May 9th 2016 - The Enigma Ransomware
(Russian)
May 10th, 2016 - The Shujin Ransomware
(Chinese)
May 11th, 2016 - GNL Locker (German
Netherlands Locker)
May 12th, 2016 - CryptoHitman
Jigsaw  CryptoHitman with Porno Extension
Jigsaw  CryptoHitman with Porno Extension
May 12th, 2016 - Crypren Ransomware
May 12th, 2016 - Mischa Ransomware (Petya variant)
May 13th, 2016 - Offering Ransomware as a Service
May 13th, 2016 - Decryptor for CryptXXX Version 2.0
http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/
http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/
http://www.bleepingcomputer.com/ne
ws/security/emsisoft-releases-
decryptors-for-the-xorist-and-777-
ransomware/
I’m Infected, Now What?
• Disconnect Network, USB, Network Share
• Determine the Scope (Level of compromise or encryption)
• Determine type of infection
• Evaluate Your Responses
• Restore from a recent backup
• Decrypt your files using a 3rd party decryptor (this is a very slim chance)
• Do nothing (lose your data)
• Negotiate / Pay the ransom
Understanding CryptoLocker
Working
Source: Sophos
Anatomy of CryptoLocker
Cryptolocker
Cryptolocker
Cryptolocker
Anatomy of CryptoLocker
Cryptolocker
CryptoLocker
Case Study - Teslacrypt
Generic Questions
• The initial infection vector (how the malware got on the system).
• The propagation mechanism (how the malware moves between
systems, if it does that).
• The persistence mechanism (how the malware remains on the
system, and survives reboots and when the user logs out).
• Artifacts (what traces the malware leaves on a system as a result
of its execution) that you can look for during an examination.
Case Study : TeslaCrypt
• Malware sample extracted from malwr.com.
• Used all open source tool to preform analysis.
• Tools used
• Volatility Framework 2.4
• “VolDiff” (REMnux OS)
• Regshot
• Log2timeline (SIFT)
• Virustotal.com
• Process Explorer (Windows SysInternals)
Cryptolocker
Case Study : References
• [1] Zorabedian, John “Anatomy of a ransomware attack” https://blogs.sophos.com/2015/03/03/anatomy-of-a-
ransomware-attack-cryptolocker-cryptowall-and-how-to-stay-safe-infographic/; Last accessed on Oct 25, 2015.
• [2] James, Lance & Bambenek, John “The New Scourge of Ransomware: A Study of CryptoLocker and Its Friends”
https://www.blackhat.com/us-14/archives.html#the-new-scourge-of-ransomware-a-study-of-cryptolocker-and-its-
friends ; Last accessed on Oct 25, 2015.
• [3] Mustaca, Sorin "Are your IT professionals prepared for the challenges to come?"Computer Fraud & Seurity 2014.3
(2014): 18-20.
• [4] Allievi, Andrea et al. “Threat Spotlight: TeslaCrypt – Decrypt It Yourself”
http://blogs.cisco.com/security/talos/teslacrypt ; Last accessed on Oct 25, 2015.
• [5] Malwr.com (https://goo.gl/psdf5e) and Virustotal.com (https://goo.gl/D0o78x) analysis.
Prevention Measures
• Backup your files.
• Apply windows and other software updates regularly.
• Avoid clicking untrusted e-mail links or opening unsolicited e-mail attachments.
• Disable ActiveX content in Microsoft Office applications such as Word, Excel etc.
• Install Firewall and block Tor and restrictions for specific ports.
• Disable remote desktop connections.
• Block binaries running from %APPDATA%, %TEMP% paths.
"I am your enemy, the first one you've ever had who was smarter
than you. There is no teacher but the enemy. No one but the enemy
will tell you what the enemy is going to do. No one but the enemy
will ever teach you how to destroy and conquer. Only the enemy
shows you where you are weak. Only the enemy tells you where he is
strong. And the rules of the game are what you can do to him and
what you can stop him from doing to you. I am your enemy from
now on. From now on I am your teacher.”
Source : Ender’s Game
Conclusion
• Lots of googling
• Trendmicro blog
• Sophos
• Kaspersky Blog
• US – CERT
• http://www.bleepingcomputer.com/
• http://www.infoworld.com/
• https://blog.knowbe4.com/
References
Cryptolocker
Cryptolocker

More Related Content

PPTX
PPTX
Career in cyber security
PPTX
Computer Viruses
PPTX
computer system
PPTX
Ransomware attacks reveton
PPTX
Application Software
PPTX
Computer virus and anti virus presentation
PPT
Career in cyber security
Computer Viruses
computer system
Ransomware attacks reveton
Application Software
Computer virus and anti virus presentation

What's hot (20)

PPTX
Cyber crime and security
PPT
introduction To Operating System
PPTX
Cybercrime
PPT
An Open Source Case Study
PPTX
How Operating system works.
PPTX
Ransomware
PPTX
Os ppt
PPTX
Methods in java
PPT
Ppt on different types of computer viruses
PPT
Ch 3 event driven programming
PDF
Malware and security
PPTX
Internet and its working (manu)
PPT
Presentation on Programming Languages.
PPTX
Software
PPTX
Computer virus
PPTX
Cyber Security PPT - 2023.pptx
PPT
Malware
PPTX
Information security threats
PDF
Application software
Cyber crime and security
introduction To Operating System
Cybercrime
An Open Source Case Study
How Operating system works.
Ransomware
Os ppt
Methods in java
Ppt on different types of computer viruses
Ch 3 event driven programming
Malware and security
Internet and its working (manu)
Presentation on Programming Languages.
Software
Computer virus
Cyber Security PPT - 2023.pptx
Malware
Information security threats
Application software
Ad

Viewers also liked (20)

ODP
Introduction to Binary Exploitation
PPTX
Basic malware analysis
PPTX
XXE - XML External Entity Attack
PDF
PPTX
Ransonware: introducción a nuevo Virus Informático
PPTX
Automating malware analysis
PPTX
Breaking into hospitals
PPTX
Malicious Client Detection using Machine learning
PPTX
Fingerprinting healthcare institutions
PPTX
Bluetooth insecurity
PDF
Buffer overflow Attacks
PPTX
Dll preloading-attack
PPTX
Watering hole attacks case study analysis
PDF
Format string vunerability
PPTX
Advanced malware analysis training session4 anti-analysis techniques
PPTX
Dissecting Android APK
PDF
Dynamic Binary Instrumentation
Introduction to Binary Exploitation
Basic malware analysis
XXE - XML External Entity Attack
Ransonware: introducción a nuevo Virus Informático
Automating malware analysis
Breaking into hospitals
Malicious Client Detection using Machine learning
Fingerprinting healthcare institutions
Bluetooth insecurity
Buffer overflow Attacks
Dll preloading-attack
Watering hole attacks case study analysis
Format string vunerability
Advanced malware analysis training session4 anti-analysis techniques
Dissecting Android APK
Dynamic Binary Instrumentation
Ad

Similar to Cryptolocker (20)

PDF
Why are you still getting CryptoLocker?
PPTX
Defend Your Company Against Ransomware
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PPTX
Ransomware Attack.pptx
PDF
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
PDF
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
PPTX
MMW April 2016 Ransomware Resurgence
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PPTX
Ransomware by lokesh
PDF
Null mumbai Session on ransomware by_Aditya Jamkhande
PPTX
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
PPTX
Ransomware History and Monitoring Tips
PDF
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
PPTX
Ransomware: WanaCry, WanCrypt
PPTX
cryptowall_dissected
PPTX
Dissecting Cryptowall
PPTX
rensomware final ppt
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PPTX
Ransomware
PDF
Ransomware- What you need to know to Safeguard your Data
Why are you still getting CryptoLocker?
Defend Your Company Against Ransomware
Get Smart about Ransomware: Protect Yourself and Organization
Ransomware Attack.pptx
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
MMW April 2016 Ransomware Resurgence
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware by lokesh
Null mumbai Session on ransomware by_Aditya Jamkhande
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Ransomware History and Monitoring Tips
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
Ransomware: WanaCry, WanCrypt
cryptowall_dissected
Dissecting Cryptowall
rensomware final ppt
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Ransomware
Ransomware- What you need to know to Safeguard your Data

More from Cysinfo Cyber Security Community (20)

PDF
Understanding Malware Persistence Techniques by Monnappa K A
PDF
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
PDF
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
PDF
Closer look at PHP Unserialization by Ashwin Shenoi
PDF
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
PDF
The Art of Executing JavaScript by Akhil Mahendra
PDF
Reversing and Decrypting Malware Communications by Monnappa
PPTX
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
PPTX
Analysis of android apk using adhrit by Abhishek J.M
PDF
Understanding evasive hollow process injection techniques monnappa k a
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
PPTX
S2 e (selective symbolic execution) -shivkrishna a
PPTX
Dynamic binary analysis using angr siddharth muralee
PPTX
Bit flipping attack on aes cbc - ashutosh ahelleya
PDF
Security Analytics using ELK stack
PDF
Linux Malware Analysis
PDF
ATM Malware: Understanding the threat
PPT
Image (PNG) Forensic Analysis
Understanding Malware Persistence Techniques by Monnappa K A
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Emerging Trends in Cybersecurity by Amar Prusty
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Closer look at PHP Unserialization by Ashwin Shenoi
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
The Art of Executing JavaScript by Akhil Mahendra
Reversing and Decrypting Malware Communications by Monnappa
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Analysis of android apk using adhrit by Abhishek J.M
Understanding evasive hollow process injection techniques monnappa k a
Security challenges in d2d communication by ajithkumar vyasarao
S2 e (selective symbolic execution) -shivkrishna a
Dynamic binary analysis using angr siddharth muralee
Bit flipping attack on aes cbc - ashutosh ahelleya
Security Analytics using ELK stack
Linux Malware Analysis
ATM Malware: Understanding the threat
Image (PNG) Forensic Analysis

Recently uploaded (20)

PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced IT Governance
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPT
Teaching material agriculture food technology
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced IT Governance
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
NewMind AI Monthly Chronicles - July 2025
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Teaching material agriculture food technology

Cryptolocker

  • 2. Who Am I..? Forensics Investigator M.Tech (Information Security) in 2014, IIIT – Delhi Former Intern at CIRT-India. Interest : Any type of Cyber Forensics Email : adarshagarwal91@gmail.com LinkedIn : https://www.linkedin.com/in/adarshagarwal91
  • 3. Disclaimer • Entire analysis is done on individual basis. • The information in this presentation and opinion are mine alone and do not reflect those of my current employer.
  • 18. CryptoLocker a.k.a Ransomware • CryptoLocker is a ransomware Trojan. • Believed to have first been posted to the Internet on 5 September 2013. • Smart enough to travel across your network and encrypt any files located on shared network drives. • Uses AES-265 or RSA public-key cryptography, with the private key stored only on the malware's control servers.
  • 19. CryptoLocker a.k.a Ransomware • After Encryption, displays a message and popup which offers to decrypt the data if payment is made within stated deadline, and threatened to delete the private key if the deadline passes. • Ransomwares generally has a 48-72 hour deadline which, once passed, causes the ransom to increase or leads to key deletion. • Most ransoms start in the $100-$500 area or 0.5 BTC to 4 BTC. • 1 BTC = $ 430 (approx.) = 28600 INR.
  • 20. Symptoms • You suddenly cannot open normal files and get errors such as the file is corrupted or has the wrong extension. • An alarming message has been set to your desktop background with instructions on how to pay to unlock your les. • The program warns you that there is a countdown until the ransom increases or you will not be able to decrypt your les. • A window has opened to a ransomware program and you cannot close it. • You have files with names such as HOW TO DECRYPT FILES.TXT or DECRYPT_INSTRUCTIONS.HTML
  • 21. Symptoms You see a files similar to: • %PUBLIC% desktophelp_restore_files_<random text>.html • %PUBLIC% desktoprestore_files_<random text>.txt • %PUBLIC% documentshelp_restore_files _<random text>.txt • %PUBLIC% documentsrestore_files_<random text>.html • %PUBLIC% favoritesrestore_files_<random text>.html • %PUBLIC% favoritesrestore_files_<random text>.txt • CryptoLocker.lnk • HELP_TO_DECRYPT_YOUR_FILES.TXT • HELP_TO_DECRYPT_YOUR_FILES.BMP • HELP_TO_SAVE_FILES.bmp • HELP_TO_SAVE_FILES.txt • key.dat • log.html
  • 28. CryptoLocker Propagation • Propagate via phishing emails unpatched programs compromised websites online advertising free software downloads Prior existing Botnet
  • 29. Droppers file Path • The file paths that have been used by this infection and its droppers are: • C:Users<User>AppDataLocal<random>.exe (Vista/7/8) • C:Users<User>AppDataLocal<random>.exe (Vista/7/8) • C:Documents and Settings<User>Application Data<random>.exe (XP) • C:Documents and Settings<User>Local Application Data<random>.exe (XP)
  • 30. This ransomware can search for files in all of the folders with the following extensions and then encrypt them
  • 31. Excluded directories, filenames & extensions Source: Sophos
  • 32. Variants of CryptoLocker • TeslaCrypt • Cryptowall • Torrent Locker • CTB-Locker • CryptoVault • PowerShell based • Locky • Ransom32 ( JavaScript based) • Petya (Encrypts MBR) • Many many more…
  • 34. In 2016 (Jan to Mid April)
  • 35. Week 2 – May, 2016 • May 9th 2016 - CryptXXX 2.0 • May 9th 2016 - The Enigma Ransomware (Russian) • May 10th, 2016 - The Shujin Ransomware (Chinese) • May 11th, 2016 - GNL Locker (German Netherlands Locker) • May 12th, 2016 - CryptoHitman ( Jigsaw v2) • May 12th, 2016 - Crypren Ransomware • May 12th, 2016 - Mischa Ransomware (Petya variant) • May 13th, 2016 - Offering Ransomware as a Service • May 13th, 2016 - Decryptor for CryptXXX Version 2.0
  • 36. May 9th 2016 - CryptXXX 2.0
  • 37. May 9th 2016 - The Enigma Ransomware (Russian)
  • 38. May 10th, 2016 - The Shujin Ransomware (Chinese)
  • 39. May 11th, 2016 - GNL Locker (German Netherlands Locker)
  • 40. May 12th, 2016 - CryptoHitman
  • 41. Jigsaw  CryptoHitman with Porno Extension
  • 42. Jigsaw  CryptoHitman with Porno Extension
  • 43. May 12th, 2016 - Crypren Ransomware
  • 44. May 12th, 2016 - Mischa Ransomware (Petya variant)
  • 45. May 13th, 2016 - Offering Ransomware as a Service
  • 46. May 13th, 2016 - Decryptor for CryptXXX Version 2.0
  • 50. I’m Infected, Now What? • Disconnect Network, USB, Network Share • Determine the Scope (Level of compromise or encryption) • Determine type of infection • Evaluate Your Responses • Restore from a recent backup • Decrypt your files using a 3rd party decryptor (this is a very slim chance) • Do nothing (lose your data) • Negotiate / Pay the ransom
  • 59. Generic Questions • The initial infection vector (how the malware got on the system). • The propagation mechanism (how the malware moves between systems, if it does that). • The persistence mechanism (how the malware remains on the system, and survives reboots and when the user logs out). • Artifacts (what traces the malware leaves on a system as a result of its execution) that you can look for during an examination.
  • 60. Case Study : TeslaCrypt • Malware sample extracted from malwr.com. • Used all open source tool to preform analysis. • Tools used • Volatility Framework 2.4 • “VolDiff” (REMnux OS) • Regshot • Log2timeline (SIFT) • Virustotal.com • Process Explorer (Windows SysInternals)
  • 62. Case Study : References • [1] Zorabedian, John “Anatomy of a ransomware attack” https://blogs.sophos.com/2015/03/03/anatomy-of-a- ransomware-attack-cryptolocker-cryptowall-and-how-to-stay-safe-infographic/; Last accessed on Oct 25, 2015. • [2] James, Lance & Bambenek, John “The New Scourge of Ransomware: A Study of CryptoLocker and Its Friends” https://www.blackhat.com/us-14/archives.html#the-new-scourge-of-ransomware-a-study-of-cryptolocker-and-its- friends ; Last accessed on Oct 25, 2015. • [3] Mustaca, Sorin "Are your IT professionals prepared for the challenges to come?"Computer Fraud & Seurity 2014.3 (2014): 18-20. • [4] Allievi, Andrea et al. “Threat Spotlight: TeslaCrypt – Decrypt It Yourself” http://blogs.cisco.com/security/talos/teslacrypt ; Last accessed on Oct 25, 2015. • [5] Malwr.com (https://goo.gl/psdf5e) and Virustotal.com (https://goo.gl/D0o78x) analysis.
  • 63. Prevention Measures • Backup your files. • Apply windows and other software updates regularly. • Avoid clicking untrusted e-mail links or opening unsolicited e-mail attachments. • Disable ActiveX content in Microsoft Office applications such as Word, Excel etc. • Install Firewall and block Tor and restrictions for specific ports. • Disable remote desktop connections. • Block binaries running from %APPDATA%, %TEMP% paths.
  • 64. "I am your enemy, the first one you've ever had who was smarter than you. There is no teacher but the enemy. No one but the enemy will tell you what the enemy is going to do. No one but the enemy will ever teach you how to destroy and conquer. Only the enemy shows you where you are weak. Only the enemy tells you where he is strong. And the rules of the game are what you can do to him and what you can stop him from doing to you. I am your enemy from now on. From now on I am your teacher.” Source : Ender’s Game Conclusion
  • 65. • Lots of googling • Trendmicro blog • Sophos • Kaspersky Blog • US – CERT • http://www.bleepingcomputer.com/ • http://www.infoworld.com/ • https://blog.knowbe4.com/ References