ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    how do you figure out which machine is running cryptolocker

    IT Discussion
    cryptolocker
    6
    11
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Mike DavisM
      Mike Davis
      last edited by scottalanmiller

      I'm working on a network that is getting cryptolockered. How do I figure out which machine it's running on? I can't find one of those .txt files with the removal instructions to check the owner. All the encrypted files have maintained their ownership from the original creator.

      DustinB3403D 1 Reply Last reply Reply Quote 2
      • DustinB3403D
        DustinB3403 @Mike Davis
        last edited by

        @Mike-Davis said in how do you figure out which machine is running cryptolocker:

        I'm working on a network that is getting cryptolockered. How do I figure out which machine it's running on? I can't find one of those .txt files with the removal instructions to check the owner. All the encrypted files have maintained their ownership from the original creator.

        Pull power from the switches, and check every system individually.

        travisdh1T 1 Reply Last reply Reply Quote 1
        • A
          Alex Sage
          last edited by

          This post is deleted!
          1 Reply Last reply Reply Quote 0
          • travisdh1T
            travisdh1 @DustinB3403
            last edited by

            @DustinB3403 said in how do you figure out which machine is running cryptolocker:

            @Mike-Davis said in how do you figure out which machine is running cryptolocker:

            I'm working on a network that is getting cryptolockered. How do I figure out which machine it's running on? I can't find one of those .txt files with the removal instructions to check the owner. All the encrypted files have maintained their ownership from the original creator.

            Pull power from the switches, and check every system individually.

            Yep. @Mike-Davis Consider your entire network as down. Hopefully you can figure it out from whatever files were already hit on the file server. If not, then it's gonna be down to going and checking every workstation/device.

            1 Reply Last reply Reply Quote 2
            • scottalanmillerS
              scottalanmiller
              last edited by

              File server logs might tell you if adequate logging and accounting is turned on. But it rarely is, that would be a huge amount of logs.

              1 Reply Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller
                last edited by

                Running AV scans hopefully will find it, but in a case like this, I'd want every machine to be rebuilt. Which one it was on isn't the same as which ones it is on.

                1 Reply Last reply Reply Quote 1
                • Mike DavisM
                  Mike Davis
                  last edited by

                  Figured out how it happened. Shut it down and started on the ugly analysis. In this case there was no ransom note file. Therefore there was no .txt file to check the permissions on. In the filename that got changed, the hacker put his email address.... Restores should be done in 2 hours. The infection bypassed cryptolocker group policies because a hacker launched it. It was not picked up by Microsoft Endpoint Protection (no surprise there) or MalwareBytes. Webroot detected it. It looks like a weak password on a service account that was allowed to log in to remote desktop caused all this.

                  travisdh1T wirestyle22W 2 Replies Last reply Reply Quote 3
                  • travisdh1T
                    travisdh1 @Mike Davis
                    last edited by

                    @Mike-Davis said in how do you figure out which machine is running cryptolocker:

                    It looks like a weak password on a service account that was allowed to log in to remote desktop caused all this.

                    Is the service account something that was setup internally, or by a service provider? If a service provider, I think we want to know who it was.

                    1 Reply Last reply Reply Quote 0
                    • Mike DavisM
                      Mike Davis
                      last edited by

                      It was set up by internal staff. The sad thing is, it doesn't even look like it was still in use. Lesson for all admins out there.

                      scottalanmillerS 1 Reply Last reply Reply Quote 2
                      • scottalanmillerS
                        scottalanmiller @Mike Davis
                        last edited by

                        @Mike-Davis said in how do you figure out which machine is running cryptolocker:

                        It was set up by internal staff. The sad thing is, it doesn't even look like it was still in use. Lesson for all admins out there.

                        regular audits are just part of IT life.

                        1 Reply Last reply Reply Quote 1
                        • wirestyle22W
                          wirestyle22 @Mike Davis
                          last edited by

                          @Mike-Davis Interesting. The note file creation was what tipped it off for me at my last company.

                          1 Reply Last reply Reply Quote 0
                          • 1 / 1
                          • First post
                            Last post