Apple429

Q: Cryptowall (Help_Decrypt virus) in iCloud

Hello everyone,

 

So my mom got an email in for a job resume the other day and attached was a .zip file of what should have been a job resume, but when she opened it, she got a pop-up and the whole mess of the Help_Decrypt virus started spreading. EVERYWHERE!! So I just decided to wipe her iMac clean and start over over (we have backups, thankfully), however it appears that the virus got into her iCloud files and is preventing her from opening all of her documents. "Spreadsheet cannot be opened"

 

Is there anyway we can access a "restore point" or are we just screwed and have to start over?

 

Thanks in advance for any help everyone!

~Taylor

iMac, OS X Yosemite (10.10.3)

Posted on May 17, 2015 7:35 AM

Close

Q: Cryptowall (Help_Decrypt virus) in iCloud

  • All replies
  • Helpful answers

first Previous Page 3 of 4 last Next
  • by Shawody,

    Shawody Shawody Apr 6, 2016 10:30 AM in response to Linc Davis
    Level 1 (4 points)
    Apr 6, 2016 10:30 AM in response to Linc Davis

    Well that's that then.

     

    Anyhow, thanks Kurt and Linc for your help. I really appreciate it, I just wish we didn't have to deal with this sh**. It's just making everything a hassle...especially when you set up system for somebody who is not that IT literate...so this is going to be fun. :/

  • by Shawody,

    Shawody Shawody Apr 6, 2016 10:44 AM in response to Kurt Lang
    Level 1 (4 points)
    Apr 6, 2016 10:44 AM in response to Kurt Lang

    Kurt, was just trying to figure this one out, as it is not computing.

     

    Fair enough, you prevent Windows to see Mac folders by only using USB drive to exchange files. But what if you get malware/ransomware/infection on Windows, and you're not aware of it, when you're saving file back to your USB drive. Would it not then effectively also infect Mac when you're moving files from USB drive??

  • by Kurt Lang,

    Kurt Lang Kurt Lang Apr 6, 2016 10:52 AM in response to Shawody
    Level 8 (37,716 points)
    Apr 6, 2016 10:52 AM in response to Shawody
    Would it not then effectively also infect Mac when you're moving files from USB drive??

    No, since you've prevented Windows itself from having access to the Mac portions of your computer. The worst that can happen is you'll see Windows malware that has been copied to the flash drive, or (such as in this case) files that were encrypted by Windows malware. But that's it. It would be the same as getting Windows malware in your Mac's email. It's there, but can't do a darn thing to OS X.

  • by Shawody,

    Shawody Shawody Apr 6, 2016 11:00 AM in response to Kurt Lang
    Level 1 (4 points)
    Apr 6, 2016 11:00 AM in response to Kurt Lang

    Thanks Kurt. I was thinking about that, but wasn't completely sure if that is in fact the case.

  • by etresoft,

    etresoft etresoft Apr 6, 2016 4:49 PM in response to Shawody
    Level 7 (29,101 points)
    Apr 6, 2016 4:49 PM in response to Shawody

    Hello Shawody,

    Malwarebytes and DetectX ran so quickly because they only check for Mac-specific threats. They aren't like antivirus tools ported from Windows that scan for 10 million Windows viruses and 4 Mac trojans. They were both written by members of Apple Support Communities and are safe and effective. However, they aren't going to remove anything that isn't there. It is true that no anti-malware tool is going to be able to detect zero-day threats. But the sad fact is that most people who have adware or malware problems are usually dealing with 287-day threats that can be easily detected and removed. I don't doubt that your problem was caused by Windows malware and I'm quite sure that it would have been prevented had you been running Windows anti-malware.

     

    It would help if you reviewed exactly what folders were shared. ~/Library/Containers is an unusual place. It would be unusual to have PDF, text files, image files in that location. Could you be more specific about which folders were affected?

     

    Finally, what's the big deal about running LittleSnitch? Half of all Mac users in the world run that.

  • by Shawody,

    Shawody Shawody Apr 6, 2016 5:43 PM in response to etresoft
    Level 1 (4 points)
    Apr 6, 2016 5:43 PM in response to etresoft

    Hi Etresoft,

     

    Well, there is up-to -date McAfee AV installed on the Windows side. I'll run it again tomorrow and see if that gets anything. Plus I think there was also Malwarebytes or some anti-malware for Win if I'm not mistaken that I downloaded the other day. I'll try run that tomorrow again and see.

     

    Folders in Library/Containers:

    - com.apple.weatherkitservice

    - com.apple.Photos

    - com.apple.Photomoments

    - com.apple.Notes

    - com.apple.Maps

    - com.apple.ncpluginstocks

    - com.apple.apple.ical

    - com.apple.ibooksX (also in multiple subfolders)

    - com.apple.geod

    - com.apple.facetime

    - com.apple.calendaragent

    - com.apple.appstore

     

    No big deal in little snitch. I'd say that will prob save more than any other malware/AV for mac.

  • by etresoft,

    etresoft etresoft Apr 6, 2016 6:51 PM in response to Shawody
    Level 7 (29,101 points)
    Apr 6, 2016 6:51 PM in response to Shawody

    Hello again Shawody,

    Are those the folders that were affected? Or are those the folders that were shared?

     

    Anything in the Containers folder should have only internal files for each sandboxed app. I would not expect any of those folders to have PDF, text, or image files. Any modifications to any of those folders would likely cause the associated app to crash, have some kind of incorrect operation, or perhaps not affect it at all.

     

    Could you provide a directory listing of a sample of the affected files?

  • by Shawody,

    Shawody Shawody Apr 8, 2016 3:17 AM in response to etresoft
    Level 1 (4 points)
    Apr 8, 2016 3:17 AM in response to etresoft

    No, as far as I can tell the Library/Containers folders have not been shared, at least they're not set in the Sharing folders settings of the VMWare. The only thing common, looking through the Library/Containers subfolders, seems to be the shortcuts to Desktop folder (as well as shortcuts to all other User folders, eg Documents, Pictures, etc.). Desktop folder was affected to some degree and was shared with VMWare.

     

    Other folders that were affected were on both internal harddrives, While some folders have been shared with VMWare, others like Pictures, Downloads and User home folder were not.

     

    Could you please explain what you mean with sample of the affected files? Is it the file extensions you're looking for? If so, they were mainly PDFs, DOCs, Excel, Powerpoint, CAD. None of which open, it just says the files are invalid.

     

    Actually, I just found tons more affected folders. :/ It nested itself into the Photos Library database. I just got curious and looked inside the database and found files that search in Finder did not show. To paint the picture, HELP_DECRYPT files are inside the main Photos database, then in each subfolder that leads to a subfolder with the actual JPG files. It's probably moot point mentioning that JPGs are gone, as they cannot be opened anymore. :/

  • by etresoft,

    etresoft etresoft Apr 8, 2016 5:57 AM in response to Shawody
    Level 7 (29,101 points)
    Apr 8, 2016 5:57 AM in response to Shawody

    Hello again Shawody,

    It seems pretty clear that at least some higher-level folder was shared, allowing full access to files on the Mac. Don't do that. Only share a folder that has no other use. I suggest sharing the /Users/Shared folder.

  • by Shawody,

    Shawody Shawody Apr 8, 2016 6:35 AM in response to etresoft
    Level 1 (4 points)
    Apr 8, 2016 6:35 AM in response to etresoft

    Hi Etresoft,

     

    Isn't /Users/Shared folder, also one of the higher-level folders? Or is that folder percieved somewhat different by the system?

  • by etresoft,

    etresoft etresoft Apr 8, 2016 6:59 AM in response to Shawody
    Level 7 (29,101 points)
    Apr 8, 2016 6:59 AM in response to Shawody

    Hello again Shawody,

    No. There is usually nothing in that folder. And there are no other directories inside it. If you are using it for something else, then create a new folder elsewhere to share with VMWare.

  • by Shawody,

    Shawody Shawody Apr 8, 2016 9:45 AM in response to etresoft
    Level 1 (4 points)
    Apr 8, 2016 9:45 AM in response to etresoft

    But here's the thing, Pictures folder was never shared with VMWare, yet the whole folder is now gone, complete with Photos Library database. Neither was /Users folder shared with VMWare, it was only some of its subfolders.

     

    Following that logic, the ransomware spread up the hierarchy, perhaps looking for the most common names of folders and file types, meaning that even if I only share the /Users/Shared folder, it will still spread to other folders.

  • by etresoft,

    etresoft etresoft Apr 8, 2016 1:20 PM in response to Shawody
    Level 7 (29,101 points)
    Apr 8, 2016 1:20 PM in response to Shawody

    Hello again Shawody,

    Pictures is linked from inside those ~/Library/Containers folders. I was interested in what folder was shared that gave access to those, then then to Pictures, as well as Desktop,Documents, Downloads, Library, Movies, and Music.

  • by Shawody,

    Shawody Shawody Apr 8, 2016 1:46 PM in response to etresoft
    Level 1 (4 points)
    Apr 8, 2016 1:46 PM in response to etresoft

    Here's the bizarre thing though. If it spread from Desktop, through /Library/Containers all the way to /Users folder, and then also to /Pictures, how come it didn't spread further to the second internal harddrive, as there was direct link (alias) to a pictures folder on the second harddrive. None of those pictures are affected. Also there were shared folders with VMWare on the second harddrive that were affected.

     

    So how the **** does this spread...whats the algorithm, and where does it stop. If it manages to get through some folders and aliases...why not through others?

  • by etresoft,

    etresoft etresoft Apr 8, 2016 3:48 PM in response to Shawody
    Level 7 (29,101 points)
    Apr 8, 2016 3:48 PM in response to Shawody

    Hello again Shawody,

    There is no link to the Desktop to any other location. There are links from all ~/Library/Containers folders to many other locations. But, in theory, a properly sandboxed app shouldn't have write access to those links. But VMWare isn't sandboxed at all so why did it even go into those Containers folders.

     

    If the link to the second hard drive was a true alias instead of a symbolic link, then it wouldn't be followed.

     

    But with all due respect, you could solve many of these mysteries by just telling us what many people have asked you. What folders, specifically, were shared with Windows?

first Previous Page 3 of 4 last Next