Hey Folks,
A client of mine called this morning saying their shared drive was "acting funny". I remoted in and saw a bunch of files names "decrypt_instruction" in the folders on the share (a .htm file, a .txt file and a shortcut). none of the files on the share would open. looking this up, it seems like they were hit with Cryptowall.
We tracked down which computer it seemed to come from, but the strange thing is that that the computer itself shows no other signs of infection. (the user didn't see a popup asking to pay the ransom or anything). After looking through the registry, I don't see anything related to cryptowall or other variants. The only evidence I have is the files on the share not working. this user is on a domain with folder redirection which I believe may have saved them here.
We were able to restore all the files from the shadow copies (we also have backup as well to fall back to). I've run the Eset rogue application remover that I found in a blog post about this infection, but it found nothing. I also ran the Microsoft malicious software removal tool which found nothing as well. We use Viper managed anti virus through GFI which didn't pick this up, i'm running a further deep scan now. but I haven't been able to find any traces of how this got on the computer on the first place. Her user account also doesn't seem to be effected (I'm guessing due to folder redirection)
Has anyone come across a cryptowall type infection like this? It's as if the infection got in, encrypted the files (or at least tried to) left the 3 "decrypt_instruction" files in each folder and then deleted itself.
A client of mine called this morning saying their shared drive was "acting funny". I remoted in and saw a bunch of files names "decrypt_instruction" in the folders on the share (a .htm file, a .txt file and a shortcut). none of the files on the share would open. looking this up, it seems like they were hit with Cryptowall.
We tracked down which computer it seemed to come from, but the strange thing is that that the computer itself shows no other signs of infection. (the user didn't see a popup asking to pay the ransom or anything). After looking through the registry, I don't see anything related to cryptowall or other variants. The only evidence I have is the files on the share not working. this user is on a domain with folder redirection which I believe may have saved them here.
We were able to restore all the files from the shadow copies (we also have backup as well to fall back to). I've run the Eset rogue application remover that I found in a blog post about this infection, but it found nothing. I also ran the Microsoft malicious software removal tool which found nothing as well. We use Viper managed anti virus through GFI which didn't pick this up, i'm running a further deep scan now. but I haven't been able to find any traces of how this got on the computer on the first place. Her user account also doesn't seem to be effected (I'm guessing due to folder redirection)
Has anyone come across a cryptowall type infection like this? It's as if the infection got in, encrypted the files (or at least tried to) left the 3 "decrypt_instruction" files in each folder and then deleted itself.