ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Ransomware hits admin workstation and kills 7 servers

    IT Discussion
    ransomware cryptolocker cryptowall v2.0
    5
    21
    4.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stusS
      stus Vendor
      last edited by

      I wanted to share a horror story with you, something that happened to somebody the day before yesterday. This is what happened in their own words:

      "We are a 250 employee non-profit and we heavily rely on our computer systems in almost everything we do. Yesterday, one of our admin workstations was hit with CryptoWall Version 2.0, and because this workstation had drives mapped to all our servers, and the administrator had permissions, all our seven servers were encrypted and we were dead in the water.

      CryptoWall took just 55 minutes to encrypt 75 Gigs of information, and it had penetrated most of our network before we found out what was happening, isolate the workstation and get it disconnected from the network. We had backups of the seven servers but it would take days to restore those, so we opted to find out if we could decrypt the files first.

      Luckily we had just signed up for KnowBe4’s Kevin Mitnick Security Awareness Training, which came with a crypto-ransom guarantee in case something like this would happen. We called them and got instant help with this very urgent problem.

      They had bitcoins ready in a wallet and were able to pay the $500 ransom within hours. The CryptoWall criminals were actually also pretty quick, and we were issued our decryption key soon after. We immediately started to decrypt all the files with the provided decryption tool and pulled an all-nighter. It was amazing how long it took to get through all of the data. It finally completed at around 8:30 am. So we estimate about 18 hours of running the decrypt tool on our 75 gigs of data.

      So far it only appears that one older database file was corrupted during the encryption, but we restored it from our backup and all is fine. I can’t say enough about KnowBe4’s quick response and support with this situation. We dodged a very big bullet here.

      While only a portion of our staff have completed the training, something tells me more will complete the training requirement after this event. Thank you very much!" - Q.M. IT Director

      As you can see, ransomware hitting a key employee like an admin or perhaps a CEO, controller, or CFO with a lot of access, can do immense damage.

      Having all employees step through security awareness training and sending them simulated phishing attacks, is an essential element of your defense-in-depth!

      Warm regards, Stu

      1 Reply Last reply Reply Quote 2
      • thanksajdotcomT
        thanksajdotcom
        last edited by

        Cool story. Still, who was stupid enough to get hit with Cryptolocker? Did their AV not pick this up? Did someone ignore the AV warning if it came up?

        StrongBadS 1 Reply Last reply Reply Quote 0
        • stusS
          stus Vendor
          last edited by

          The AV on the workstation was McAfee, but did not block the malware executing when the admin (in a weak moment) clicked on something... 😞

          thanksajdotcomT 2 Replies Last reply Reply Quote 0
          • thanksajdotcomT
            thanksajdotcom @stus
            last edited by

            @stus said:

            The AV on the workstation was McAfee, but did not block the malware executing when the admin (in a weak moment) clicked on something... 😞

            Oh this makes me want to laugh so hard! Time to switch to Webroot!

            1 Reply Last reply Reply Quote 0
            • thanksajdotcomT
              thanksajdotcom @stus
              last edited by

              @stus I work at McAfee. That's why I find it hysterical!

              1 Reply Last reply Reply Quote 0
              • thanksajdotcomT
                thanksajdotcom
                last edited by

                But not supporting their AV.

                1 Reply Last reply Reply Quote 0
                • stusS
                  stus Vendor
                  last edited by

                  Yes, there is some irony here. LOL

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    Welcome to the Mango Lassi community!

                    stusS 1 Reply Last reply Reply Quote 0
                    • StrongBadS
                      StrongBad @thanksajdotcom
                      last edited by

                      @ajstringham said:

                      Cool story. Still, who was stupid enough to get hit with Cryptolocker? Did their AV not pick this up? Did someone ignore the AV warning if it came up?

                      Tons of people get hit by Cryptolocker. You have to assume that people will do stupid things in order to think well about security.

                      thanksajdotcomT 1 Reply Last reply Reply Quote 0
                      • thanksajdotcomT
                        thanksajdotcom @StrongBad
                        last edited by

                        @StrongBad said:

                        @ajstringham said:

                        Cool story. Still, who was stupid enough to get hit with Cryptolocker? Did their AV not pick this up? Did someone ignore the AV warning if it came up?

                        Tons of people get hit by Cryptolocker. You have to assume that people will do stupid things in order to think well about security.

                        I know but still, that's a straight-up AV fail.

                        StrongBadS 1 Reply Last reply Reply Quote 0
                        • stusS
                          stus Vendor @scottalanmiller
                          last edited by

                          @scottalanmiller thanks Scott !!!

                          1 Reply Last reply Reply Quote 1
                          • StrongBadS
                            StrongBad @thanksajdotcom
                            last edited by

                            @ajstringham said:

                            @StrongBad said:

                            @ajstringham said:

                            Cool story. Still, who was stupid enough to get hit with Cryptolocker? Did their AV not pick this up? Did someone ignore the AV warning if it came up?

                            Tons of people get hit by Cryptolocker. You have to assume that people will do stupid things in order to think well about security.

                            I know but still, that's a straight-up AV fail.

                            AV only protects you if you let it.

                            thanksajdotcomT 1 Reply Last reply Reply Quote 0
                            • thanksajdotcomT
                              thanksajdotcom @StrongBad
                              last edited by

                              @StrongBad said:

                              @ajstringham said:

                              @StrongBad said:

                              @ajstringham said:

                              Cool story. Still, who was stupid enough to get hit with Cryptolocker? Did their AV not pick this up? Did someone ignore the AV warning if it came up?

                              Tons of people get hit by Cryptolocker. You have to assume that people will do stupid things in order to think well about security.

                              I know but still, that's a straight-up AV fail.

                              AV only protects you if you let it.

                              Yes, but AV is, as a rule, designed to prevent stupidity. IT guys could go without AV on their computers and would still almost never get viruses. Maybe some spyware, etc but almost never a full-blown virus. We know better. End-users are where AV is most important from a protection standpoint. Obviously IT guys have the admin rights but from a preventing it for prevention's sake standpoint, AV is most important for end-users. Obviously McAfee wasn't doing its job...

                              DashrenderD StrongBadS 2 Replies Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender @thanksajdotcom
                                last edited by

                                @ajstringham said:

                                @StrongBad said:

                                @ajstringham said:

                                @StrongBad said:

                                @ajstringham said:

                                Cool story. Still, who was stupid enough to get hit with Cryptolocker? Did their AV not pick this up? Did someone ignore the AV warning if it came up?

                                Tons of people get hit by Cryptolocker. You have to assume that people will do stupid things in order to think well about security.

                                I know but still, that's a straight-up AV fail.

                                AV only protects you if you let it.

                                Yes, but AV is, as a rule, designed to prevent stupidity. IT guys could go without AV on their computers and would still almost never get viruses. Maybe some spyware, etc but almost never a full-blown virus. We know better. End-users are where AV is most important from a protection standpoint. Obviously IT guys have the admin rights but from a preventing it for prevention's sake standpoint, AV is most important for end-users. Obviously McAfee wasn't doing its job...

                                Sadly Steve Gibson, a renown security specialist, has reportedly done this - run with NO AV, and gotten no viruii.

                                I just don't consider that wise unless you're air gapped.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • thanksajdotcomT
                                  thanksajdotcom
                                  last edited by

                                  @Dashrender , I'm not saying it's a good idea. We need it because legitimate sites still get hacked and create vulnerabilities for us where there aren't normally ones. Still, most IT guys would be fine 98% of the time without any AV on their systems.

                                  DashrenderD scottalanmillerS 2 Replies Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @thanksajdotcom
                                    last edited by

                                    @ajstringham said:

                                    @Dashrender , I'm not saying it's a good idea. We need it because legitimate sites still get hacked and create vulnerabilities for us where there aren't normally ones. Still, most IT guys would be fine 98% of the time without any AV on their systems.

                                    LOL - considering another discussion - Programmers would not be covered by this 98%.. lol

                                    thanksajdotcomT 1 Reply Last reply Reply Quote 1
                                    • thanksajdotcomT
                                      thanksajdotcom @Dashrender
                                      last edited by

                                      @Dashrender said:

                                      @ajstringham said:

                                      @Dashrender , I'm not saying it's a good idea. We need it because legitimate sites still get hacked and create vulnerabilities for us where there aren't normally ones. Still, most IT guys would be fine 98% of the time without any AV on their systems.

                                      LOL - considering another discussion - Programmers would not be covered by this 98%.. lol

                                      Lol I suppose that would be true

                                      1 Reply Last reply Reply Quote 0
                                      • StrongBadS
                                        StrongBad @thanksajdotcom
                                        last edited by

                                        @ajstringham said:

                                        Yes, but AV is, as a rule, designed to prevent stupidity.
                                        Not at all, let alone as a rule. That is not what AV is. I think you are confusing it with best practices.

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @Dashrender
                                          last edited by

                                          @Dashrender said:

                                          Sadly Steve Gibson, a renown security specialist, has reportedly done this - run with NO AV, and gotten no viruii.

                                          I just don't consider that wise unless you're air gapped.

                                          Sure, you can. You can also not use passwords or always run as the admin. There are all kinds of things that you might get away with. Security is about layers. You can run servers without backups too and you might never lose a thing. But we all know that it is risky. But if you roll the dice, sometimes you make a critical hit no matter how unlikely it is.

                                          And Steve Gibson only doesn't think he has a virus. He doesn't actually know.

                                          1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @thanksajdotcom
                                            last edited by

                                            @ajstringham said:

                                            @Dashrender , I'm not saying it's a good idea. We need it because legitimate sites still get hacked and create vulnerabilities for us where there aren't normally ones. Still, most IT guys would be fine 98% of the time without any AV on their systems.

                                            I've not met these IT guys. I don't think that that is a realistic statement at all. I'd say saying 2% would be fine would be a stretch. Most IT people I see run as admin and are pretty reckless with security.

                                            DashrenderD 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post