Over the past few months, UT Arlington has fallen victim to Crypto-malware. In the two instances we’ve handled, documents in department K: drives were encrypted. We have recently received a notice from the Texas Department of Information Resources (DIR) Office of the CISO alerting us to several ransomware infections within the state. The infections include variants “CryptoLocker” and “CryptoWall.”
According to DIR, the Trojan appears to have been spread mainly though emails and in one case the email was presented as a fax confirmation. At UT Arlington, both infections involved employees browsing to websites that were infected. The computers involved had vulnerable Java and/or Adobe plug-ins; there is strong indication that this was the attack vector for the ransomware.
While it is possible to remove the virus itself, the ISO is unaware of any method to decrypt the files. The private key, needed for decryption, is stored on a Command and Control server and is only available to the attacker. The only way to recover from a Crypto attack is to restore from backups.
We urge all departments to ensure their systems and applications are fully patched, their anti-virus is up-to-date, and ensure current backups of critical files exist in approved locations. Approved locations include OIT managed K: and J: drives, UTA CrashPlan and UTA Box.com
Please be aware that a potentially new variant of the Cryptolocker ransomware has been identified. “Ransomware” is a new category of malware that can prevent access to a computer, or the data on it, unless the victim pays a ransom to the malware creator. The Cryptolocker malware encrypts files on the victims computer and then demands payment for the files to be unlocked.
Because this is a new variant of the malware, there are no current ways to protect you from it. The only protection is to not open attachments that you are not expecting or that look suspicious. The malware is primarily delivered via email and often contain a subject line enticing you to open an accompanying attachment. Below is an example of the message (Subject: Invoice Payment Confirmation; Attachment: Invoice_Details_01.04.2014.zip).
The malware can potentially be sent to your UTA email or your personal email (e.g. gmail, Hotmail, yahoo, etc) account.
If you fall victim to this virus, you will not be able to unlock your files and must rely on your backups. The malware can be aggressive has been known to encrypt files on local hard drives, external drives and potentially your file shares (e.g. your K: and J: drives).
UTA Employees: To backup your data on a UTA owned computer, you may use CrashPlan (search for “CrashPlan” in the search box on the UTA website).
For updates on this advisory, please check back periodically or send an email to email@example.com. If you need help on how to use CrashPlan or if you are a victim of this virus, contact the Help Desk at 2-2208.
Please see our previous blog entry about Cryptolocker for background and tips.