{"id":15146,"date":"2016-06-10T21:45:40","date_gmt":"2016-06-10T21:45:40","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5664"},"modified":"2022-05-05T03:19:22","modified_gmt":"2022-05-04T16:19:22","slug":"cryptors-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/cryptors-protection\/15146\/","title":{"rendered":"Cryptors: emergency measures to save business data"},"content":{"rendered":"<p>We have all been talking about ransomware for some time now. Theoretically, every business should have already learned how to protect itself against this type of threat. However, we continue to see new threads appearing on specialized sites where people request help with decoding the files affected by some cryptor. And the number of people and companies hit by these malicious programs keeps growing, too.<\/p>\n<p>Moreover, it is mostly small and medium-size businesses at risk. Criminals are well aware that cybersecurity issues are seldom a priority for small business managers. At the same time, small and midsize companies may have enough money to draw cybercriminals\u2019 interest.<\/p>\n<p>So, let us suppose your company has had the misfortune of contractingransomware. What urgent measures should you take to minimize the damage to your business without missing a step?<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Cryptors: emergency measures to save business data<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4NYh&amp;text=%23Cryptors%3A+emergency+measures+to+save+business+data\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>1. Diagnose the state of emergency<\/strong><\/p>\n<p>Ransomware has several obvious symptoms. Upon system infection, most popular files fail to open \u2014 documents, images, and so forth. All or almost all folders teem with txt\/html\/hta\/bmp\/png files carrying such eloquent names as help_decrypt, recover, and the like. Those files contain the demands of the criminals \u2014 the ransom note.<\/p>\n<p>Some cryptors change file extensions (VVV, XXX, ABC, etc.), but others do not.<\/p>\n<p>Sometimes the Windows desktop wallpaper is changed and replaced with an image containing the criminals\u2019 demands. Sometimes the malware blocks access to the system completely, and the preboot screen displays the ransom note.<\/p>\n<p>If you are very lucky, you may see the malware \u201cworking,\u201d and that is when you may be able to stop the encryption before it\u2019s complete. In that case you\u2019re going to need\u2026<\/p>\n<p><strong>2. Quarantine and anesthesia<\/strong><\/p>\n<p>Immediately isolate the attacked system: Disconnect it from the local network and unplug the computer. There is a chance that the malware has not yet spread to other machines. However, you may have to unplug and disconnect all workstations and servers from the network at once.<\/p>\n<p>Why unplug? Well, it\u2019s the only surefire way to prevent the cryptor from working and ruining all of the files on your computer.<\/p>\n<p>It is worth noting that the new version of <a href=\"https:\/\/business.kaspersky.com\/anti-cryptor\/5442\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Windows Server<\/a> includes a component called \u201cProtection from encryption.\u201d It employs heuristic detection to stop network-based attempts to encrypt data on the server. As soon as such an attempt is detected, the infected computer is instantly blocked from accessing shared folders on the server.<\/p>\n<p><strong>3. Surgery<\/strong><\/p>\n<p>OK, so you\u2019ve unplugged the affected system. Now comes the task of getting access to its disk without compromising other machines.<\/p>\n<p>The procedure is simple: Remove the drive and prepare to connect it to another machine \u2014 but first, disable autorun on the computer that you are about to connect the drive to. Also, you will need a file manager other than the standard Windows Explorer to see the drive\u2019s contents.<\/p>\n<p>You should certainly not run anything on the infected system. Using a virtual machine might be a good idea, too, as an additional safety measure.<\/p>\n<p>Copy all of the files you need from the infected drive. Do not rush to uninstall the operating system and format the drive. There have been some cases when artifacts helped to decode files.<\/p>\n<p>Another option is to start up an infected system with the help of a <a href=\"https:\/\/support.kaspersky.com\/viruses\/rescuedisk\" target=\"_blank\" rel=\"noopener\">Kaspersky Rescue Disk<\/a>.<\/p>\n<p>In any case, your next step is contacting experts, who will find out what, exactly, you are dealing with.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5668\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/05\/06020528\/main-2.jpg\" alt=\"main\" width=\"1000\" height=\"633\"><\/p>\n<p><strong>4. Diagnosis<\/strong><\/p>\n<p>Eventually, experts should analyze the malware. Kaspersky Lab\u2019s support team has already defined the most common varieties of ransomware. Anything more exotic will go to our virus analysts for investigation.<\/p>\n<p><strong>5. Medication<\/strong><\/p>\n<p>The likelihood of regaining access to the encrypted data greatly depends on getting an exact diagnosis. Many pieces of malware today use strong cryptosystems, so decoding them is improbable without the key from the cybercriminals.<\/p>\n<p>However, some ransomware uses less-powerful algorithms or contain errors that allow the recovery of encrypted files without having to pay the ransom. If it\u2019s at all possible to restore the original data, Kaspersky Lab deploys data recovery utilities such as <a href=\"https:\/\/support.kaspersky.com\/viruses\/disinfection\/11333\" target=\"_blank\" rel=\"noopener\">ScatterDecryptor<\/a> and <a href=\"https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547\" target=\"_blank\" rel=\"noopener\">RannohDecryptor<\/a>.<\/p>\n<p>Even when decryption is \u00a0not possible, there\u2019s still a chance you can get your data back. For example, files processed by the third and fourth versions of TeslaCrypt did not yield to decoding at all \u2014 but then, for some reason, the creators of the malware suddenly ceased their operations and <a href=\"https:\/\/threatpost.com\/master-decryption-key-released-for-teslacrypt-ransomware\/?utm_medium=blg&amp;utm_source=kb_post_160611&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">published a master key<\/a> that can be used to decrypt all files encrypted by TeslaCrypt. That was a unique case, though. You shouldn\u2019t count on criminals suddenly growing a conscience.<\/p>\n<p>If the \u201cmedicine\u201d already exists that enables you to restore the data, that\u2019s very good news. If not, then you\u2019re down to two options:<\/p>\n<ol>\n<li>The \u201cblood transfusion\u201d \u2014 aka recovering the data from backup storage. That\u2019s assuming you have a backup.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li>\u201cCryonics,\u201d or putting the encrypted data away for an indefinitely long time. There is always a tiny, but real, chance that we will discover technical means to crack the encryption \u2014 or that the attackers will be found and jailed, and their master keys made public.<\/li>\n<\/ol>\n<p>In the latter case, we aren\u2019t talking about promptly restoring access to the data, unfortunately.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Cryptors: The likelihood of regaining access to the encrypted data greatly depends on getting an exact diagnosis.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4NYh&amp;text=%23Cryptors%3A+The+likelihood+of+regaining+access+to+the+encrypted+data+greatly+depends+on+getting+an+exact+diagnosis.+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>6. Preventive measures<\/strong><\/p>\n<p>The best modus vivendi, of course, is implementing security solutions that protect your company\u2019s workstations and servers from all kinds of cyberthreats, including ransomware. And we cannot stress enough the importance of regular data backup.<\/p>\n<p>We\u2019ll talk about this in more depth next time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p> Theoretically, every business should have already learned how to protect itself against ransomware. Actually it&#8217;s not the case. <\/p>\n","protected":false},"author":2706,"featured_media":15390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[420,2427],"class_list":{"0":"post-15146","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-ransomware","10":"tag-saving-files"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptors-protection\/15146\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptors-protection\/15046\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptors-protection\/15146\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptors-protection\/15146\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15146"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15146\/revisions"}],"predecessor-version":[{"id":24527,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15146\/revisions\/24527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15390"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}