Posted 11 February 2016 - 08:31 AM
Posted 09 April 2016 - 02:59 PM
We got hit 4/7 by what appears to be a variant of TeslaCrypt. It completely encrypted the offending workstation, went after a large mapped share on a Windows server and found a insecure Samba share that was not mapped or used at all by that workstation so I assume it scanned the subnet for insecure shares and found a weakness. In any case, The damage was caught fairly quickly and we DO have current backups so the damaged files were quickly restored and the offending workstation has nothing of value on it so I'll just wipe it and reinstall.
No real harm done because of the backups but it sure woke me up and is causing some sleepless nights worrying have I REALLY eradicated it from my network. Amusing the offending workstation is completely wiped, is there anything else I should be watching out for, looking for worn like or other behavior that would have attempted to actually compromise or run on a server or other workstation rather than just encrypting a share over the network.
I've secured the insecure Samba share and set the Group Software Restriction Policies recommended in the Information Guide and FAQ here, as well as making sure everything that should be updated is updated.
FWIW I uploaded the exe file here.
https://virustotal.com/en/file/3570a4ca9a3ebd1b45df61a0ef5b476e26f35ba03dbd114e8192fa6b81b0cd71/analysis/1460209365/
The encrypted files had no change in file names or added extension
Each folder had three files with the ransom demand.
-!RecOveR!-wqxwn++.Png
-!RecOveR!-wqxwn++.Txt
-!RecOveR!-wqxwn++.Htm
Backups work!!! My main concern is being sure I am REALLY rid of it on the network.
Posted 09 April 2016 - 05:34 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 18 May 2016 - 03:14 PM
Posted 19 May 2016 - 01:39 AM
TeslaCrypt has closed its doors and released the master decrypt key. BloodDolly has already updated his tool so it can now decrypt all files encrypted by TeslaCrypt 3.0 and 4.x. More info here:
http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/
Thank you very much for this update!
Please also update the first post of this topic.
Posted 19 May 2016 - 04:05 AM
Un grand merci à toute l'équipe!!!
Je vais essayer de récuperer mes fichiers avec TeslaDecoder
Posted 19 May 2016 - 05:04 AM
A note has been added....Please also update the first post of this topic.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 24 May 2016 - 12:50 AM
TeslaCrypt has closed its doors and released the master decrypt key. BloodDolly has already updated his tool so it can now decrypt all files encrypted by TeslaCrypt 3.0 and 4.x. More info here:
http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/
I have tired the tesladecoder but it was reported that the encrypt key is a different one...seems something wrong happens with my case?
Posted 24 May 2016 - 05:34 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
0 members, 1 guests, 0 anonymous users