Ransomware, Part 2 – The Java Connection

So, I have successfully removed the ransomware/malware form the infected computer.

Booting the computer up to Safe Mode or Safe Mode with Networking would still activate the malware. That’s because it replaces the registry entry for Windows Shell from “Explorer.exe” to something else. So, boot the computer to “Safe Mode with Command Prompt” and type “regedit.exe” at the command prompt.

In registry editor, go to:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon

In this particular case it was replaced with:

C:PROGRA~3dsgsdgdsgdsgw.bat

Ransomware Infected Windows Shell

Delete the entry and replace it with:

Explorer.exe

Reboot the computer into “Safe Mode with Networking” and launch a web browser. Download, install and run the following programs if you haven’t already:

There are also other programs to scan and remove the malware.

Combofix detects that userinit.exe s also infected.

Ransomware Combofix userinit

Microsoft Security Essentials also detected presence of Trojan:JS/Reveton.A, which was detected on January 11, 2013.

Ransomware through Java

This computer was infected on Friday January 11, 2013, shortly after news about Java vulnerability was reported. After further investigations, I found that the infection happened through Java vulnerability. The infected computer had both Java 6 and 7 installed. Malwarebytes AntiMalware Free detected and removed the malicious Java module. Similar vulnerability was found back in August 2012.

Let’s take a look at the ransomware/malware.

It takes over Windows User Interface (UI) and replaces windows shell with the threatening message purporting from United States Department of Justice: “YOUR COMPUTER HAS BEEN LOCKED”

Ransomware

The message says that the computer has been locked for one or more violations:

  • Article – 184. Pornography involving children (under 18 years)
  • Article – 171. Copyright
  • Article – 113. The use of unlicensed software

They are pretty much the same language used in other ransomware/malware purporting from FBI, Police Cybercrime Investigation Department, etc. Some people might fall for this.

Ransomware 3 violations

The malware also tries to activate the computer camera, for the purpose of scaring the user. Even though the infected computer doesn’t have any cameras installed, the malware pretends that it is recording video of the user.

Ransomware video recording

The malware demands $300 to be paid in MoneyPak so users can unlock the computer.

Ransomware MoneyPak

So convenient that the malware tells you where to get this MoneyPak.

Anyway, you need to disable Java from your browsers.

If you’re using Mozilla Firefox, follow the instruction here: How to turn off Java applets

If you’re using Google Chrome, go to:

Settings > Privacy > Content Settings > Plug-ins > select “Click to play”

Also go to chrome://plugins/ to manually disable Java if necessary. (type in chrome://plugins/ in the address bar / omnibox)

If you are using Safari, go to:

Preferences > Security > uncheck “Enable Java”

If you are using Internet Explorer, follow the instruction from Sophos.

Ransomware, Part 1

I’ve gotten a call earlier today from a friend because his computer has been locked by “The United States Department of Justice”.  In addition to that “The United States Department of Justice” demands computer owner to pay $300 to unlock the computer “avoid other legal consequences”.

First and foremost, The United States Department of Justice does not run such operation.

This is a ransomware. It replaces Windows 7 shell with its own executable file. Booting the computer to plain “Safe Mode” or” Safe Mode with Networking” will load the malicious executable. Instead, boot to “Safe Mode with Command Prompt” and manually remove the malicious software.

I’ll describe what I did in the next post.

Ransomware

Nokia, You’ve gotta be kidding me!

Meatloaf is not amused

From GigaOM:

Nokia has confirmed reports that its Xpress Browser decrypts data that flows through HTTPS connections – that includes the connections set up for banking sessions, encrypted email and more. However, it insists that there’s no need for users to panic because it would never access customers’ encrypted data.

Nokia is playing the role of the man in the middle with the Xpress Browser. Nokia installs its own SSL/TLS certificate in the XPress Browser so it could create a secure/encrypted session to Nokia’s own server. The server then initiates https session with the website.

Does anyone remember what Opera Mini does?

Some corporate networks use proxy that request https session on the proxy on behalf of the computers in their networks.

AirPort Utility: Create hidden network

We had a request from someone to stop AirPort Express broadcasting the SSID, for security purpose.

Hiding Wireless network SSID does not really enhance security.

Unfortunately, this tactic may lead to a false sense of security, as it only impedes casual wireless snooping, and does not stop a determined attack on the network.

There are numerous of tools that can scan any hidden SSID.

Just in case anyone still want to hide their AirPort Express or AirPort Extreme SSID:

In AirPort Utility, go to “Wireless” and click on “Wireless Options…”

AirPort-Express-Wireless-Configuration

Check the box for “Create hidden network”

Airport-Express-Hidden-Wireless-Network

MacBook Pro Backlit Keyboard Connector

Vondiggity was having an issue with his MacBook Pro, the keyboard no longer lit up. According to the Keyboard System Preference Pane, the backlit keyboard was not present either. After resetting the SMC and NVRAM, the problem persisted. It was a strong possibility that the backlight was disconnected; and I was right. The backlit keyboard connecter can be accidentally disconnected while replacing RAM or Hard Drive.

There is a tiny piece of tape that help keep the ribbon connected to the logic board.

MBP Backlit Keyboard Connector 1

Remove the tape carefully, because you would need it to secure the connection later.

MBP Backlit Keyboard Connector 2

Push the ribbon into the connecting slot on the logic board. Use something that will not deform or damage the ribbon.

MBP Backlit Keyboard Connector 3

Place the tape to help the ribbon in its slot.

MBP Backlit Keyboard Connector 4

Reset the SMC and NVRAM again, OS X will then re-enable the backlit keyboard extension.

MBP Backlit Keyboard

Year End Special: Bookkeeping and Malware

End of the year is one of the busiest time, especially for small businesses. It is such an inconvenient to find out the one computer used for accounting was infested with malware. Do whatever it takes to remove the malware, for it is a huge problem. Use all available resources to remove the malware. A lot of them are freely available.

One computer I am working on right now is infested with MyWebSearch and other malware. Not to mention numbers of toolbars on Internet Explorer and Firefox. Fortunately, all the tools mentioned above able to remove the malware.

PUP-MyWebSearch