Book now with code EOY2025
NetworkingStudent wrote: » To the best of my knowledge, the virus is pretty easy to remove. Not sure why others are suggesting a wipe and reload.
Cert Poor wrote: » Pretty sure CryptoLocker's old enough now that all antivirus have signatures for it. So the question is how could a client get infected with it in the first place?
Cert Poor wrote: » Re: ZeuS: Abuse.ch has a great ZeuS tracker. I have the IPs blocked at home even so there's no way it could really phone home to a C&C server. I assume enterprises have more toys and expertise than I do so don't see how they could get infected unless lazy.
e: ZeuS: Abuse.ch has a great ZeuS tracker. I have the IPs blocked at home even so there's no way it could really phone home to a C&C server. I assume enterprises have more toys and expertise than I do so don't see how they could get infected unless lazy.
YFZblu wrote: » Here's the deal - overall, today's commodity malware is quite sophisticated. Ultimately, unless one is able to understand the full capabilities of the malware on the system, then one cannot fully guarantee that the system is clean after remediation. And I'm not just talking about knowing how Cryptolocker generally behaves; unless you as a technician are capable of reversing every aspect of the software, then you won't be sure. Different variants are released far too quickly to assume some analyst's malware blog is exactly the variant you're looking at. Additionally, if you're dealing with a kernel-mode rookit, the computer is lying to you. A/V says your system is clean? It's lying. Netstat shows no connections unaccounted for? It's lying. Task Manager looks good? It's lying. In the enterprise, where workstation uptime is valued, true malware analysis and a comprehensive investigation is a specialized skillset which is done out of band. In the meantime, techs should simply give the user another workstation so they can get back to business without the risk of being owned for an extended period of time. Did you know the banking trojan Zeus has been observed installing Cryptolocker on systems in the wild? It's quite feasible one of your users gets infected by a Zeus variant, which successfully evades antivirus, and then downloads a detectable version of Cryptolocker. Once Cryptolocker is detected and the technician 'cleans' the system by way of using documentation specifically tailored to Cryptolocker, the Zeus infection remains on the system, silently stealing information. The User is still compromised. I've said it before - people need to stop "cleaning" malware infections. Nuke and pave, always.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!