NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Bains's avatar
Bains
Guide
Nov 11, 2015
Solved

CryptoLocker and a backup strategy

I am requesting the community to evaluate and criticize this approach to CyberLocker

 

We are basically a Windows shop and we are scared to death about the CyperLocker virus.

 

From what I read, it is almost impossible to detect the virus/malware and it infects lots of systems because workers are curious, naive, or dumb. Our judgement is that we will get hit eventually.

 

Mapped drives are the essence of our internal networking strategy for all of our locations. All of the mapped drives in the Windows workstations point to shares on the ReadyNAS device. As far as I can tell we are perfect candidates for CyberLocker to scramble our data.

 

StephenB provided a good idea in a prior 2013 exchange on this topic -- use file read only folder permissions to repel CyberLocker changes for the backup folders which are located on a local workstation.  It was a great idea and we have been using that approach for the past two years.  Now, the trade press is discussing how the malware has evolved -- one reviewer said it looked like a software business with revisions and point releases and a collections department. As the capability gets better storage of backups within the workstation environment seems less appropriate since changing file permissions is fairly trivial in the Windows environment.

 

 In order to avoid the issue we are now considering upgrading our ReadyNAS units to include another set of disks (RAID 1) and using them for backup instead of having the backup stored on a robust workstation. The idea is to use the ReadyNAS backup capability to copy the data to non-mapped areas that are created with the “hide directory” option enabled -- a CIFS designation. This would establish a set of a set of hidden folders in the Windows environment that still could be accessed if the precise device/folder UNC path was specified in File Explorer.

 

We would use the ReadyNAS backup capability for night-time backup. In case of infection by CyberLocker we would have a recent backup that is not encrypted.

 

An additional precaution is to create seven (or more) ReadyNAS backup jobs – one for each day of the week. That way we would have the essential equivalent of a seven day backup cycle in case the most recent backup fails.

 

Any comments would be appreciated.

 

BTW, we have implemented off-site storage for the case of theft or destruction of the NAS unit. That component of our backup is not considered in this discussion.

  • Bains's avatar
    Bains
    Nov 13, 2015

    Let's summarize this thread.  I will open a new thread regarding the Netgear implementation/use of the rsync command.

     

    CryptoLocker and its variants are ‘in the wild’ and using an infected PC to encrypt most files as well as the file and directory names. The malware chases all local drives and any mapped drives as it encrypts the data. Once encrypted users are told to pay a ransom of between $700 and $70,000 dollars in bitcoins or never recover their data.

     

    Currently the only way to feasibly recover the data is either pay a ransom or restore the data from backup files. The backup files should be on a ReadyNAS share that does not have SMB access enabled so the malware cannot detect the data – it is not part of a mapped drive.

     

    The intention is to have backup of various Windows files and directories on a ReadyNAS that are the object of drive mapping in local PC network.

    • The backup share should be established without SMB protocol enabled. Turn SMB off in the Network Access tab in the file properties
    • The rsync protocol should be enabled and Read/Write access should be allowed. Use the Network Access tab in the file properties.

    Now there is a location for file backups that will not be discovered by CryptoLocker.

     

    The next step is to establish a backup job(s) to copy the ‘live’ mapped data to the essentially hidden data area.

22 Replies

Replies have been turned off for this discussion
  • StephenB's avatar
    StephenB
    Guru - Experienced User

    CryptoLocker was shut down in the June 2014, and the encryption key was broken in August 2014 (https://en.wikipedia.org/wiki/CryptoLocker).  Though of course malware generally is getting more and more sophisticated over time.

     

    Since hidden files and folders can easily be seen in windows (just by choosing the right explorer option), it might not be a very effective countermeasure by itself. Though it does no harm, and could be helpful. 

     

    I think you can do better though - keeping the 7 daily shares completely inaccessible from windows (SMB turned off, at least most of the time).

     

    I'm thinking that you back up the PCs to share X daily (say at 0100).  Share X is hidden SMB.  Then create 7 backup jobs (one for each day of the week) in frontview.  Have them start after the daily PC backup normally finishes - say 1300.  Each would use incremental rsync.  On Monday, back up X to the Monday share; on Tuesday back up X to the Tuesday share, etc.

     

     

     

     

     

    • Bains's avatar
      Bains
      Guide

      Thanks for the response. I am looking for ideas and I am not anything close to a UNIX expert and have limited understanding – do not laugh at my questions.

       

      Here is some more of my thinking…

      • CryptoLocker is running on the Windows workstations or servers.
      • It only knows about the ReadyNAS file data because it was ‘introduced’ to the device location by drive mapping.
      • Unlike the predecessor versions it also encrypts directory and file names so confusion reigns supreme during the initial problem evaluation.
      • The hidden files on The ReadyNAS need to be specifically addressed by a precise UNC address. Guessing would be equivalent of a brute force attack and probably unlikely for this malware..
      • The malware has to go for the low hanging fruit so sophistication probably is not embedded in the code at this time. Doing packet inspection and other techniques is probably not part of its operation.

       

      You said disable SMB for these hidden shares most of the time. That sounds like a great idea since those shares would not need to be accessed except in case of an emergency and the setting could be turned on at that time. In its place would I just use RSYNC as the file protocol??

       

      You described the backup as I envisioned it – multiple days each independent of the other using the ReadyNAS backup capability – disk to disk operation.in our case within the same cabinet.

       

       

       

      Just a point of clarification CryptoLocker has not been shut down; Version 3 is now infecting client systems. The June 2014 ‘capture’ was good but it is now history with a substantially more robust version with different distribution. The Wikipedia article is outdated. Additionally the payments now range from $700 to over $70,000 all payable in bitcoins.

       

      Here are some recent references.

      http://blogs.wsj.com/cio/2015/11/10/ransomware-attacks-to-grow-in-2016-says-intels-mcafee-labs/

       

      http://www.wsj.com/articles/paying-ransoms-to-hackers-stirs-debate-1447106376

       

      https://securityledger.com/2015/10/fbis-advice-on-cryptolocker-just-pay-the-ransom/

       

      https://www.backblaze.com/blog/locker-cryptolocker-progeny-awakens/

       

       

      • StephenB's avatar
        StephenB
        Guru - Experienced User

        Thanks for clarifying the cryptolocker info.  As your links point out there is other ransomware too. 


        Bains wrote:

        You said disable SMB for these hidden shares most of the time. That sounds like a great idea since those shares would not need to be accessed except in case of an emergency and the setting could be turned on at that time. In its place would I just use RSYNC as the file protocol??

         

        You described the backup as I envisioned it – multiple days each independent of the other using the ReadyNAS backup capability – disk to disk operation.in our case within the same cabinet.

         

         

        Yes, I was thinking there'd be one hidden SMB share used as the windows backup destination, and 7 rsync protocol shares (perhaps with https also enabled, so you check on them easily).  You'd enable SMB either to audit them, or to restore data - otherwise it would be off.

         

        Note to do this you'd need to set up the rsync backup jobs' source as an rsync server, using 127.0.0.1 as the source IP address.

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More