How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline backups; test backups to ensure that they can be restored from reliably. Use web and email protection to block access...
How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every time your computer boots up or restarts. Step Two: CONTACTING HEADQUARTERS – Before ransomware can affect you, it contacts a...
Where is Ransomware? Ransomware can be found everywhere. We thought that the well known file-encrypting ransomware, as known as CryptoLocker, was over and done with after law enforcement knocked out its infrastructure last year, but CryptoLocker , as well as other variations of malware, are back. Ransomware is a form of malware that will prevent you from having access to your files and even your computer. Then, it attempts to extort money from you in...
ShadowExplorer (www.shadowexplorer.com) is an awesome application which I’ve used as a PC Technician many times in the past. It is used to provide a graphical ‘front-end’ interface for a rather complicated command line utility called VSSADMIN.EXE (an internal Windows component) which handles “Volume Shadow Copies” of files made by Windows. These are sort of ‘backups’ in a sense and the Volume Shadow Copy service in Windows is indeed used by various backup software to accomplish backup tasks....
I recently wrote about new positions and Foolish IT expansion, and just before that upcoming CryptoPrevent releases and new designs for our flagship software d7II. I have several important CryptoPrevent related announcements after this, but first I would like quote myself from one of these recent posts: CryptoPrevent was created in late 2013, on suggestion from an existing d7 customer, in order to help his customers shortly after the outbreak of the original CryptoLocker. It...
#1 Question: Will this protect against new ‘Crypto’ malware such as CryptoDefense, CryptoWall, etc., and their newer v2, v3, and future variants? A number of new CryptoLocker clones have emerged that can also be prevented by CryptoPrevent. The majority of these are protected against by default protections with their older versions, but newer variants are coming out that can only be stopped by the Maximum Protection + Program Filtering (BETA) option, which uses a definitions based system to keep current with...
CryptoPrevent v7.3.x brings some new features, more clarity on protection levels, and improved protection! First, CryptoPrevent now supports SSL/TLS encryption and StartTLS for your SMTP server settings! This enables support for a wider variety of SMTP servers, allowing users requiring this level of encryption to configure their email alert functionality. Previously only SSL was supported. Second, CryptoPrevent’s experimental “Program Filtering” has reached BETA status. Program Filtering compares executable files to a hash based definitions...
Changes in v7.0: NEW simplified and easy to understand interface, replacing the many obscurely labeled protection option check boxes with a few simple protection “levels” to select from (the old interface still exists in the Advanced menu, and it has been updated as well.) Updated to not trigger Malwarebytes Anti-Malware detections with the installed version (thanks to the MBAM research team.) Improved Filter Module function. Changed recommended defaults slightly. Enabled optional “Experimental Protection” level (the Experimental EXE/COM settings in the Filter...
Previously, CryptoPrevent only came in a standard EXE based installer file, which is great and can be deployed silently/automatically via command line parameters, and this is ok for those with RMM tools to deploy with. Unfortunately most admins of domains were stuck without a way to deploy CryptoPrevent via GPO, as it was not available as an MSI based installer. Well, I finally figured out the tools for MSI creation, yay! So now when your purchase...
CryptoPrevent v6 is no longer based solely on Windows software restriction policies, and now includes a real-time filter and definitions files/updates! New ‘Filter Module’ that can filter certain executables against hash based definitions, can also filter based on other criteria using a more complex rule set, and allow user the option to run the file anyway. Enabled for CPL, SCR, and PIF files by default – advanced options allow to enable for EXE/COM files also (experimental!) New...