Posted 06 November 2013 - 04:34 AM
Posted 06 November 2013 - 08:11 AM
Wondered when someone would get round to detecting this type of behavior. How much write overhead does the driver introduce?
Posted 06 November 2013 - 08:58 AM
Up until now I've only heard of infection on a PC that is already part of a botnet, or from a compromised email. Am I right that in this video the payload is delivered from a web page?
Posted 06 November 2013 - 09:16 AM
Up until now I've only heard of infection on a PC that is already part of a botnet, or from a compromised email. Am I right that in this video the payload is delivered from a web page?
Well you can get infected by Zbot on pages with exploit kits for Java and/or Flash player and Zbot can download and install CryptoLocker.
• Please do not PM me asking for support. Post on the forums instead it will increases the chances of getting help for your problem by one of us.
• Posts in the Malware section that are not replied to within 4 days will be closed. PM me or a moderator to reactivate.
• Please post your final results, good or bad. We like to know! Thank you!
Proud graduate of GeekU and member of UNITE
___
Rui
Posted 06 November 2013 - 09:19 AM
Up until now I've only heard of infection on a PC that is already part of a botnet, or from a compromised email. Am I right that in this video the payload is delivered from a web page?
Certainly appears that way... and it would seem to back up Ratbuddy's claims. IIRC, he also visited a TV show download website when he got infected....
let me know how "user" friendly it is.
Seems to be running fine so far on my desktop and laptop....(FF). Got a weird "1053 error" on my laptop, but after reboot all seems to be fine. Am also running CryptoPrevent 4.0 (autoupdates) on both computers.
Edited by Joe_BubbA, 06 November 2013 - 09:22 AM.
Posted 06 November 2013 - 09:44 AM
Actually Emsisoft Anti-Malware has been detecting this behavior for a while now.Wondered when someone would get round to detecting this type of behavior.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 06 November 2013 - 10:08 AM
Please let me [ us ] know more about "your" program.
.
As it stands now ...... when I click your posted link it attempts to take me to another website.
.
So until I can find the time to research your info,
I will watch your progress from here.
.
Posted 06 November 2013 - 10:25 AM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 06 November 2013 - 01:12 PM
Up until now I've only heard of infection on a PC that is already part of a botnet, or from a compromised email. Am I right that in this video the payload is delivered from a web page?
Certainly appears that way... and it would seem to back up Ratbuddy's claims. IIRC, he also visited a TV show download website when he got infected....
Nope, I didn't get infected. My mom's computer did, and I'm not sure where it came from. Well, I'm sure it came from her having Java 1.6 patch 11 or so installed, but I don't know what site infected the computer. She helpfully decided to clear the browser history and temporary files two days before the Cryptolocker message came up. She didn't have any email attachments, and she uses Gmail anyway, which I think blocks executable files.
Posted 06 November 2013 - 04:55 PM
Posted 06 November 2013 - 05:21 PM
Erik can you tell me more about Hitman.Alert and how CryptoGuard is part of it? Are they the same thing or is CryptoGuard a program under the Hitman.Alert umbrella?
HitmanPro.Alert is our free tool (1.8MB) that alerts the user when banking malware has compromised their web browser.
We've added CryptoGuard as a feature to this tool/platform since Alert already provides an alerting mechanism to the end user. Technically, CryptoGuard is a filter driver that is installed by HitmanPro.Alert. For reference, Process Monitor (Sysinternals) also uses a filter driver to monitor file system events.
Past months we received an increasing number of reports of computers being infected with crypto ransomware while there was no real solution other than keeping your AVs up-to-date. We all know how good they work against zero-day attacks: it varies a lot.
We decided to take a different approach (blocking the right binaries is really hard) and came up with CryptoGuard. Instead of looking at the binary, look at what it is doing.
So yes, CryptoGuard is a feature under the HitmanPro.Alert umbrella.
Edited by erikloman, 06 November 2013 - 05:22 PM.
Posted 06 November 2013 - 05:59 PM
Posted 06 November 2013 - 06:09 PM
OK thanks. So if they install this software they not only gain the benefit of the cryptoguard but of the banking malware alerts?
Yes. Alert will warn immediately when it sees that critical web browser APIs (like cryptography and network APIs) have been compromised by banking malware like Zeus, SpyEye, Sinowal (aka Mebroot and Torpig), Citadel, Cridex, Carberp, Shylock, Tinba, etc.
In addition Alert vaccinates the computer by setting a few markers that some malware families look for when infecting a computer. With these markers the computer looks like a research computer and some malware families won't deploy. See also this article: https://community.rapid7.com/community/infosec/blog/2013/05/13/vaccinating-systems-against-vm-aware-malware
See this Alert settings dialog for a brief overview:
Edited by erikloman, 06 November 2013 - 06:11 PM.
0 members, 2 guests, 0 anonymous users