We have seen CryptoWall hit a number of systems too over the last month or two 
for different organizations around the city.  Has anybody on the list been able 
to determine the attack or infection vector for it?  We'd really like to figure 
out how it's getting into the networks and systems to begin with.

Just figured I'd throw the question out there.

David J. Veer
david.v...@me.com


On Nov 14, 2014, at 10:50 AM, John Quigley <quigs...@gmail.com> wrote:

Thanks, all, for the comments and advice. I have given your recommendations and 
comments to my friend.

I was particularly struck by Mr. Guarino's story about receiving support from 
Cryptowall's operators after he paid the ransom. That's a great story, even if 
it portends badness for our time.

Just to add a couple data points that I became aware of after I posted...

* This is Cryptowall, so no easy key recovery like has been reported with 
CryptoDefense or others.

* The malware arrived through a fake fax attachment in Outlook that a receptionist opened.
* He did have backups, as many have asked about, but they must have been 
through a connected drive because they were encrypted as well. His IT was 
outsourced to a local firm.

In talking with someone at a local cloud company yesterday, I learned that a 
number of large organizations in our town, including banks, have been hit with 
Cryptowall in the past few weeks. On the news this morning was a report of a 
sheriff's office in TN paying the $500 ransom after working with FBI.

Crazy stuff. Thanks again.



On Thu, Nov 13, 2014 at 6:32 PM, David Lang <da...@lang.hm> wrote:

    You also don't know if the records were tampered with. The fact that they 
were able to encrypt them shows that they had the capability to tamper with 
them.

    It's not a likely attack (too much money to be made with the simple 
approach), but it's possible.

    David Lang


    On Thu, 13 Nov 2014, Morgan Blackthorne wrote:

        My thought would be that if something got into the setup enough to 
encrypt
        the files, it could have also transmitted them.
        On Nov 13, 2014 1:56 PM, "Bill Bogstad" <bogs...@pobox.com> wrote:

            On Thu, Nov 13, 2014 at 7:42 PM, Tracy Reed <tr...@ultraviolet.org> 
wrote:

                On Thu, Nov 13, 2014 at 10:11:28AM PST, Morgan Blackthorne 
spake thusly:

                    I'd be wondering if HIPPA requires him to disclose the 
breach to his
                    clients since it is medical information.


                Yes.


            http://www.hhs.gov/ocr/ privacy/hipaa/administrative/ 
breachnotificationrule/


                But if he didn't even have separate backups I doubt he will be 
overly

            concerned

                about this. For better or worse, odds are DHHS will never know 
about it

            unless

                one of his patients reports him so likely nothing will come of 
it.


            I'm not so sure.   If the data was encrypted in place (never left 
his
            systems) then
            it was never disclosed to inappropriate parties and my reading of 
that
            link is that this would not be considered a breach.   Not that this
            would make me happy as a patient...

            Bill Bogstad


    _______________________________________________
    Tech mailing list
    Tech@lists.lopsa.org
    https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
    This list provided by the League of Professional System Administrators
     http://lopsa.org/

    _______________________________________________
    Tech mailing list
    Tech@lists.lopsa.org
    https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
    This list provided by the League of Professional System Administrators
     http://lopsa.org/


_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to