Threat Name: CryptoWall 2.0
Threat Type: Ransomware
Primary target: Windows users
Date discovered: Version 1.0 - April 2014; Version 2.0 - Oct 2014
CryptoWall is the latest strain of ransomware to rise to prominence, extorting more than $1 million from victims and wreaking havoc on thousands of police departments, businesses, and individuals across the globe.
On the surface, CryptoWall is similar to its better-known predecessor Cryptolocker, another strain of crypto-ransomware. But there are many differences.
Victims are typically infected with CryptoWall by opening a malicious email attachment, though drive-by-downloads on websites are also possible. The email attachments are often zip files that contain executables disguised as PDFs.
Once on the system, CryptoWall scans all mapped drives and encrypts important files. A text file then opens to explain the situation: the victims’ files are encrypted and a ransom must be paid to unlock them. The ransom is typically $500 in Bitcoins, which will double if not paid within seven days.
Related - Ransomware: How to prevent a crypto crisis at your business
A few features of CryptoWall 2.0 highlight the growing sophistication of ransomware. Information comes from a recent in-depth analysis:
CryptoWall removal is typically not a challenge. A simple scan with free antivirus software like Malwarebytes can handle it in minutes.
The real challenge is how to decrypt files once they are locked. Even after the malware is removed, the files will remain encrypted. Unlocking them without a key is practically impossible.
Once files are locked, the only hope of unlocking them is to pay the ransom. This is likely to work but it is far from guaranteed and we do not recommend it (feeding criminals just makes them worse). A better idea is to remove the malware, delete the encrypted files, and restore them from backup if possible. You can find more information at Bleeping Computer.
The old adage that an ounce of prevention is worth a pound of cure could not be more right in this case. How to prevent and mitigate a CryptoWall infection:
Block - CryptoWall traffic is associated with IP 146.185.220.0/23. Block this IP range by adding it to your static blacklist.
Patch – Always maintain the latest versions of your firmware, antivirus, operating systems, and other systems. Routinely update as new patches become available.
Educate – Explain to users the dangers and warning signs of phishing emails and suspicious attachments.
Backup – Maintain backups of all important files both onsite and offsite. Test them often. Ensure they are configured to prevent backup of infected files.
Plan – Assume disaster is inevitable. Plan how you will respond.
Configure – Adjust security settings to prevent forced downloads.
Control – Use web filtering to control the sites users can access. Use egress or outbound traffic filtering to prevent connections to malicious hosts.
Ransomware: How to prevent a crypto crisis at your business