mechBgon
Super Moderator<br>Elite Member
- Oct 31, 1999
- 30,699
- 1
- 0
I wasn't able to identify the source. Didn't see any bogus emails.
IIRC, drive-by exploits of Java, and weak Remote Desktop passwords, are a couple of the attack vectors used by Cryptolocker.
Practical countermeasures:
1. if possible, ditch Java entirely. If not, disable it in your browsers if that'll work. If it's needed for just specific websites, enable it strictly for those sites and disable it everywhere else. Furthermore, enable SRP and slam shut all the loopholes using the AccessChk auditing routine.
2. if RDP is enabled and you need it, use best practices. Use really strong passwords, only allow non-Admins to connect, make sure UAC is maxed out, make sure elevation prompts require credentials on the Secure Desktop, ensure Network-Level Authentication is required, and SSL protocol required (that one's in Group Policy, along with encryption level). And [broken record] enable SRP and slam shut all the loopholes [/broken record]. And ditch Java
In the end, what saves a lot of people is backups, so anyone who's gearing for battle with Cryptolocker should evaluate their backup strategy, and remember mapped drives are part of Cryptolocker's target list. Something like Windows Home Server backup would be a good idea. At work, that's my trump card if I need it. I recently updated all the boxen to Win8.1 and that did call for a re-audit of the SRP loophole rules, there's some new ones.
Last edited: