CryptoWall and CryptoLocker are ransomwares which infect a computer usually via email. Once a computer is infected, the malware encrypts certain files stored on the computer. Thereafter, the malware will display a message demanding payment to decrypt the files. Infection usually takes place when a user clicks on an executable file attached to a spam email.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Update: A new variant of the above ransomwares is CryptoWall 3.0. It is similar to CryptoLocker and CryptoWall and uses TOR to fetch the encryption keys.
SonicWall Gateway Anti-Virus and SonicWall IPS provide protection against this threat via the following signatures:
CryptoWall | CryptoLocker |
GAV: Crypwall.H (Trojan) GAV: Cryptowall.A (Trojan) CryptoWall 3.0 GAV: CryptoWall.B (Trojan) GAV: JSCript.Crypto.RES (Trojan) | GAV: Filecoder.BQ (Trojan)
|
SonicWall Application Control can prevent I2P tunnels on your network via the following signatures:
For more information on the workings of this malware, you can refer to the following SonicAlerts:
This article describes tips to follow to be protected against this malware.
NOTE: These Services are Optional, in order to protect may require additional Purchase and also few services like Botnet and DPI SSL are supported with selected products only.
Recommend to check your product and its capabilities for further details and purchase options.
1. Gateway Anti-virus (GAV)
Under the settings of each protocol (HTTP etc), enable the check boxes under
Enable GAV on all internal and external zones under Manage | Network | Zones.
2. Intrusion Prevention Service (IPS)
3. Botnet Filter
Enabling Botnet Filter will block access to known command and control servers of this malware.
4. Content Filter Service (CFS)
Enable CFS and configure to block sites in the “Malware” and “Hacking/Proxy Avoidance Systems”
5. App Control Advanced
CryptoWall is known to use TOR to obtain the encryption keys used for encrypting files. Therefore, use App Control Advanced to block TOR. By enabling the signatures for TOR, CryptoWall will not be able to obtain the keys needed to encrypt files thus mitigating further damage to the infected host computer.
Tor will use Encrypted key exchange application,in order to block that:
6. DPI-SSL Client Inspection
Enabling Client DPI-SSL, although not a mandatory measure, would provide additional security because 1) almost all web and email traffic is over SSL. For example, if a spam email is received over SSL, SonicWall will not be able to detect the malware contents, if any, in it. 2) initial connection to TOR gateway is over SSL. Enabling DPI-SSL will allow SonicWall to decrypt such traffic and scan it for malware. Under the Manage | Deep Packet Inspection | SSL Client deployment page, enable the check boxes under Gateway Anti-virus and Intrusion Prevention.
Note: DPI-SSL requires a license and is supported in NSA 220 and higher appliances with SonicOS 5.6 and above firmware.
7.CryptoWall or CryptoLocker infection may not always happen over the Internet.
It could occur over shared files and/or drives or over shared removable media like USB thumb drives and external hard disks. Therefore, Administrators are advised to adhere to basic system level security to protect internal hosts in the network from being infected.
Suggestions include, but not limited to:
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Update: A new variant of the above ransomwares is CryptoWall 3.0. It is similar to CryptoLocker and CryptoWall and uses TOR to fetch the encryption keys.
SonicWall Gateway Anti-Virus and SonicWall IPS provide protection against this threat via the following signatures:
CryptoWall | CryptoLocker |
GAV: Crypwall.H (Trojan) GAV: Cryptowall.A (Trojan) CryptoWall 4.0 GAV: CryptoWall.B (Trojan) GAV: JSCript.Crypto.RES (Trojan) | GAV: Filecoder.BQ (Trojan)
|
SonicWall Application Control can prevent I2P tunnels on your network via the following signatures:
For more information on the workings of this malware, you can refer to the following SonicAlerts:
This article describes tips to follow to be protected against this malware.
NOTE: These Services are Optional, in order to protect may require additional Purchase and also few services like Botnet and DPI SSL are supported with selected products only.
Recommend to check your product and its capabilities for further details and purchase options.
1. Gateway Anti-virus (GAV)
Under the settings of each protocol (HTTP etc), enable the check boxes under
2. Intrusion Prevention Service (IPS)
3. Botnet Filter
Enabling Botnet Filter will block access to known command and control servers of this malware.
4. Content Filter Service (CFS)
Enable CFS and configure to block sites in the “Malware” and “Hacking/Proxy Avoidance Systems”
5. App Control Advanced
CryptoWall is known to use TOR to obtain the encryption keys used for encrypting files. Therefore, use App Control Advanced to block TOR. By enabling the signatures for TOR, CryptoWall will not be able to obtain the keys needed to encrypt files thus mitigating further damage to the infected host computer.
Tor will use Encrypted key exchange application,in order to block that:
6. DPI-SSL Client Inspection
Enabling Client DPI-SSL, although not a mandatory measure, would provide additional security because 1) almost all web and email traffic is over SSL. For example, if a spam email is received over SSL, SonicWall will not be able to detect the malware contents, if any, in it. 2) initial connection to TOR gateway is over SSL. Enabling DPI-SSL will allow SonicWall to decrypt such traffic and scan it for malware. Under the DPI-SSL | Enable SSL Client Inspection page, enable the check boxes under Gateway Anti-virus and Intrusion Prevention.
Note: DPI-SSL requires a license and is supported in NSA 220 and higher appliances with SonicOS 5.6 and above firmware.
7.CryptoWall or CryptoLocker infection may not always happen over the Internet.
It could occur over shared files and/or drives or over shared removable media like USB thumb drives and external hard disks. Therefore, Administrators are advised to adhere to basic system level security to protect internal hosts in the network from being infected.
Suggestions include, but not limited to: