| 
                           
                        Ransomware 
                          has become a nasty problem lately. It quickly encrypts 
                          all document, PFD, and picture files on your hard drive 
                          (some of the more aggressive ones have a wider range 
                          of affected filetypes - we'll address that later, in 
                          the IT professionals section below, where we 
                          talk about viable recovery options.) 
                        For 
                          now, you should be aware of three things: 
                         
                          1. If you're not backing up your files, 
                          YOU SHOULD BE.  
                        Also, 
                          be sure your secondary backup is not connected 
                          directly to your computer at all times, or it could 
                          be encrypted as well. This goes for shared network resources 
                          and mapped network drives.  
                        Ideally 
                          your secondary backup should either be an offsite backup 
                          service, a drive you ONLY connect to the computer during 
                          backup cycle (or you could cycle out your permanently 
                          connected USB backup weekly), or a mapped network drive 
                          on a secure computer whose link/access is TERMINATED 
                          at the end of any backup script.  
                         
                          2. There (under most circumstances) IS NO 
                          WAY to unencrypt the files. They're encrypted with 
                          a 1024-bit RSA key. If that means nothing to you, fine, 
                          but you should now that it equates to, in human terms, 
                          "uncrackable." 
                         
                          3. Even if you do pay the ransom, you MAY NOT get 
                          your files back. If your antivirus has halfway removed 
                          the virus, it may have removed the part with your key 
                          response in it to access the unlock code in attacker's 
                          database. Also, the attacker may have picked up shop 
                          and moved on.  
                         
                        How 
                          does this happen? 
                        So 
                          we know this is VERY DANGEROUS and destructive. The 
                          best way to prevent hardship is to not catch the virus 
                          in the first place. Keep your antivirus up to date, 
                          don't click on ads or strange links, and DO NOT open 
                          zipfiles in E-mails stating such things as "you 
                          have a late invoice" or "you missed your FedEx 
                          package." 
                           
                          These mails look very convincing, but that is the intent. 
                           
                        Also, 
                          ads on the internet with taglines like "you won't 
                          BELIEVE what happens next!" or "The AMAZING 
                          thing a Winsconsin mom did!" are almost always 
                          a trap. We call these "click-bait." 
                         
                          RANSOMWARE GUIDELINES: 
                        Okay, 
                          so we know how to AVOID it, but nothing's 100% proof 
                          against everything, so let's start with what you 
                          should do as an end-user if you suspect ransomware 
                          on your computer.  
                        Your 
                          first clue is that some of your files aren't opening 
                          properly. Pictures will say something like it isn't 
                          in "the right format" and your documents 
                          will come up as gibberish, and some programs will 
                          ask you what "format" or "encoding" 
                          they're in. This is a sign that the virus has encrypted 
                          these files.  
                         
                          STEP 1: TURN OFF THE COMPUTER. 
                         
                          Actually, I'm going to repeat that. 
                         
                          STEP 1: TURN OFF THE COMPUTER. 
                          STEP 1: TURN OFF THE COMPUTER. 
                          STEP 1: TURN OFF THE COMPUTER. 
                          STEP 1: TURN OFF THE COMPUTER. 
                          STEP 1: TURN OFF THE COMPUTER. 
                         
                          These things eat through files AMAZINGLY quickly. The 
                          faster you turn off your computer,  
                          the less damage. 
                         
                          DO NOT turn your computer back on because 
                          you "just need one E-mail." The moments 
                          it takes to recover that E-mail could mean hundreds 
                          to thousands of files lost. 
                         
                          STEP 2: LEAVE THE COMPUTER OFF 
                         
                          I will repeat from Step 1: Under NO circumstances should 
                          you turn the computer  
                          back on. The virus destroys files at an alarming rate, 
                          and a few moments = hundreds 
                          of files. 
                         
                          STEP 3: INFORM YOUR IT SUPPORT 
                         
                          Let them know not to boot to the operating system. Tell 
                          them there's an encryption  
                          locker virus on it. Competent IT people can recover 
                          some of your data if you're VERY 
                          VERY lucky. However, the probability is usually low. 
                         
                        FOR 
                          IT PROFESSIONALS: 
                         
                          Through trial an error, we've come up with the best 
                          way (relatively speaking) to deal with a ransomware 
                          locked computer. Luckily, most of them are sort of a 
                          code-by-numbers kit, and a lot of people releasing these 
                          are lazy in their programming, targeting only the most 
                          common, highly esteemed files (.jpg/jpeg, .gif, .doc/docx, 
                          .xls/xlsx, .bmp, .png, .tif... you get the idea.) and 
                          they leave things like .QBW/.DBF/.PST/.MBX alone.  
                        That 
                          makes recovery a little more simple, and hopefully a 
                          little more successful.  
                        You'll 
                          need a Live Linux USB, an external USB hard 
                          drive with PLENTY of space, an active internet 
                          connection to get to the Linux repos (not necessary 
                          if USB Linux is preloaded with all the proper tools), 
                          and a recent copy of Testdisk/photorec. 
                        STEP 
                          1: Boot the computer into live Linux with a USB drive. 
                           
                          A CD here will be too slow and clunky, and you'll want 
                          to install a few extra tools from the repos  
                          (or just grab our premade ones. Links at top where it 
                          says "Attention Geeks!") A CD works, sort 
                          of, but... not well. 
                         
                          Make sure that the computer's internal hard drive shows 
                          up, and that Linux is reading the files. You won't have 
                          to worry about the virus spreading any further, as it 
                          won't run under Linux, and you can assess the damage 
                          more thoroughly.  
                        Back 
                          up all the salvageable files and directories into a 
                          FOLDER on a USB hard drive. 
                         
                          Use this opportunity to grab files in the AppData and 
                          ProgramFiles directories that your clinet will want, 
                           
                          such as quickbooks and other database files, PST files 
                          and folders, and any specialized data folders, files, 
                          and directories from proprietary software. 
                          
                          CLONE THE HARD DRIVE TO A .RAW FILE USING dd 
                         
                          This is a good idea if you miss something. You'll be 
                          formatting their hard drive anyway, after you're done, 
                          so cloning it thoroughly at a raw-data level is advisable. 
                           
                        This 
                          will ensure maximum recoverability. If you haven't been 
                          messing with dd lately, the command is: 
                        sudo 
                          dd if=/infected_dev of=/backupdrive/partition/image.RAW 
                          conv=sync,noerror bs=4M 
                          
                        PHOTOREC 
                         
                          Now that you have a backup, you can start trying to 
                          pull files off the damaged drive.  
                        Interestingly 
                          enough, this virus USUALLY seems to generate the encrypted 
                          version of the file, delete the old file, and THEN copy 
                          the new file into it place. This is good news. It means 
                          that the original file exists, albeit without filename 
                          OR info on the hard drive somewhere.  
                         
                          This is another good reason to turn the computer off 
                          immediately. The "blank" space doesn't get 
                          overwritten. 
                         
                          Install testdisk, and use the photorec option, 
                          telling it to scan the whole disk, regardless of partitions. 
                         
                          For partition type, always select "Other: ntfs/Fat32/etc." 
                          because I guarantee that your partition is almost always 
                          NTFS in this case, unless they had a flash drive plugged 
                          in that fell victim to the virus.  
                         
                          Point the restore directory to a FOLDER on your 
                          good, external USB hard drive and wait. (You may have 
                          to try several times and you don't want everything mixed 
                          in together). 
                         
                          (Be sure to put Linux's desktop into presentation mode, 
                          or, failing that, turn off the sleep/hibernate feature.) 
                          
                        LOOK 
                          FOR FILES OVER 1MB 
                         
                          You are going to have a LOT of files recovered from 
                          PhotoRec.  
                        Almost 
                          all of them are going to be the result of every banner 
                          ad, web image, Facebook game, software installer, news 
                          site logo, and internet image that the end user has 
                          ever looked at. That's okay, it means we're actually 
                          getting somewhere.  
                        HOWEVER! 
                          If you're looking for quick results to tell you that 
                          you are actually recovering files, do a search on all 
                          the PhotoRec results (usually lots and lots and lots 
                          and LOT of directories) for JPG files between 1 and 
                          16MB. 
                         
                          Windows had this feature built into the Explorer filesearch 
                          bar, and it shouldn't be difficult. If you're using 
                          Linux the command is a tidge more complex, but then 
                          again, you're using Linux, so you'll be fine. ; ) 
                          
                        AFTERMATH/CLEANUP 
                         
                          Format the hard drive completely before reinstalling 
                          Windows. Your clients haven't been backing up  
                          until now, and there's no reason to kid yourself that 
                          they're probably going to start now. That LAST thing 
                          you want is for them to re-infect themselves with a 
                          pre-loaded copy of the virus.  
                         
                          INSTALL ANTIVIRUS AND UPDATE IT COMPLETELY before 
                          dumping the salvaged files back onto their computer. 
                          If you can't figure out why, then you don't need to 
                          be in the I.T. industry.  
                         
                          When restoring PST/MBX/mailbox files of any sort, make 
                          sure the antivirus has the mailbox scan tool present. 
                          Most likely your client got the virus from a fake E-mail 
                          with a .zip attachment. Don't let them re-infect themselves 
                          from the get-go.  
                         
                          Keep the .RAW file from their pre-formatted hard drive 
                          around for a while, just in case.  
                         
                          Give them ALL the files PhotoRec recovers. I've had 
                          clients that save little piddly ad images for reference, 
                          and I'd rather THEY make the call on what to DELETE, 
                          than ME make the call on what to salvage or not.  
                         
                          NONSTANDARD FILE FORMATS 
                         
                          Okay, so if you're here, you've got hold of one of the 
                          nastier variants that doesn't limit itself to just 
                          personal document and image files. Now, PhotoRec has 
                          a LOT of filetypes it recovers, but some fall 
                          through the gaps. I've tried to add custom file info 
                          to it with varying degrees of success, but if you're 
                           
                          REALLY in a pinch, you'll need to get a good hex editor, 
                          look up info on the file type you're after 
                          (headers, identifiers, etc. - I LOOOVE file types that 
                          store the actual filename in the file header.  
                          It's absolutely MARVELOUS.) 
                         
                          Once you've found any identifying quirks, just run a 
                          search (either on the damaged hard drive OR  
                          its RAW file) for any identifying bits or bobs of the 
                          file. With any luck, it's deleted, but not over- 
                          written, and corruption will be at a minimum. 
                         
                          I like HxD as a good, free, Windows-based hex 
                          editor, but any one will do, provided it has an ASCII 
                           
                          text raw search feature. Good luck! 
                        
                         
                           
                          
                   |