Buy Depakote mexico Can you buy Depakote in spain Buy Depakote online australia Can i order Depakote online Can i buy Depakote online in uk Depakote purchase canada Buy Depakote uk Depakote 500 mg purchase Buy Depakote online usa How to buy Depakote from canada

Search And Delete Emails in Exchange2013

This is a quick  blogged guide for administrators who need to delete an email from their organization for some reason or another. In my case this was due to a cryptolocker like virus outbreak called Cerber.

The Task: Find the emails and delete them from the system to prevent further incidents from popping up making more work for us because we always have to re-image and physically replace the machines in some cases not to mention user downtime.

First Step:

First we want to be able to locate and identify the emails targeted for deletion. In my case we received the payload from this address: Sharyn.chpdc@rambler.ru (first just want to say .ru its Russian!) we should never open emails like this but users will still go for it. There are several ways to find where the emails went and find out who read them and so on and this is what we will do going off this address.

Options for Searching: Exchange Powershell OR Exchange E-Discovery Gui

I’ll use both normally. In many cases if the search involves gathering emails it is easiest for me to just run an E-discovery search and shoot them over into a PST file. In the case of deletions though we want to use the Powershell since it is the only way as of now that I know of to delete emails from the system and user mailboxes in mass action.

-So log into your Exchange server as the Exchange Admin or verify you have proper rights to run search commands(ref:https://technet.microsoft.com/en-us/library/dd298059(v=exchg.160).aspx)

exchangeServer

then open the Exchange Management Shell and we can now use the following commands to search for our items with the matching email address.

Get-mailbox -ResultSize unlimited | Search-Mailbox -SearchQuery “From:sharynchpdc@rambler.ru” Targetmailbox adminuser -TargetFolder “SearchAndDeleteLog” -LogOnly -LogLevel Full

-This command first grabs all mailboxes within the Organization then pipes it to our search function using the “|” symbol. In our Search operation we “Searh-Mailbox -Search Query” so here we will then specifcy with the “From:” text to find our matching address. The command then follows up with a “target” mailbox and user to send a report of the results. In my case I’m sending it to my adminuser’s mailbox under the “SearchAndDeleteLog” I created for it.SearchAndDeleteLog

Here is a guide to other parameters I might use when running the search. We can use things like Subject line or Dates and get fairly specific. Keep in mind it is using KQL language which is the same syntax used in e-Discovery. Use this guide to have an idea of what search parameters you can use for the -SearchQuery: https://technet.microsoft.com/en-us/library/ms.o365.cc.searchquerylearnmore.aspx#emailproperties

Once you receive the results you like you can then move on to delete them. with the following command:

Get-mailbox -ResultSize unlimited | Search-Mailbox -SearchQuery “From:sharynchpdc@rambler.ru”  -DeleteContent

This command will basically gather the results and delete them from the mailboxes. You will be asked to say yes to all deletions from each mailbox.

I advise running a backup on anything before deleting it but since this is virus in the email we clean our hands of it.

The Cerber File Encrypting Virus

Screen Shots:

CerberRansom
CerberRansom1Ran into this bad boy today. I was reviewing the code from the github dump i found  here: https://gist.github.com/hasherezade/628928248e8e6c8dae04#file-config-json-L453

I was concerned that it worked on also infecting file shares but from what I can see it doesn’t touch them. After having a user infect a computer here in our Network it looks like nothing else has been touched but all the files on her computer displaying messages like this:

Cerber Virus

Every file basically encrypted until you pay the son of aguns.

Basic Steps on handling this type of problem:

  1. Verify none of your other networked file shares have been infected and run a full virus scan of the shares just to be safe. So far I haven’t heard of Cerber jumping to any networked shares so it keeps things local to the machine which means it is mainly targeting end users. Here is a snip of Code from the above link that leads me to believe it is only keeping things local since it’s the only reference to any directories it makes:                         “folders”: [
    “:\\$recycle.bin\\”,”: \\$windows.~bt\\”,
    “:\\boot\\”,”: \\drivers\\”,
    “:\\program files\\”,”: \\program files (x86)\\”,
    “:\\programdata\\”,”: \\users\\all users\\”,
    “:\\windows\\”,”\\appdata\\local\\”,
    “\\appdata\\locallow\\”,”\\appdata\\roaming\\”,
    “\\public\\music\\sample music\\”,”\\public\\pictures\\sample pictures\\”,
    “\\public\\videos\\sample videos\\”,”\\tor browser\\
  2. Next step is to Burn the infected machine(Just re-image it) Users might ask for the files in which case they can pay the ransom if it’s that important. Something like 2 bit coins or $500 if you pay up before it doubles on you every week. One other thing users have asked me is if they can at least see the files they lost in which case your going to be taking a picture of the computer screen because there’s no safe bets I would take making any kind of digital bridge to that computer(ie: plugging in a usb stick or taking a snapshot to transfer to a usb Stick)
  3. Final step is replace the users PC and restore their files. That is if you back them up!

UPDATE:

Confirmed with Talos Security group that this is not de-cryptable as of yet