What are the most common methods of infection for this and Cryptowall? Email? Browser inujection or what? I talked to a man today that got nailed with Cryptowall v3 and he has no idea how he got it.
We've had 2 clients nailed with Crytowall 3.0 in the last week. The first time it was a bogus alert stating that their Adobe Flash was out of date. This user already had PUP on the machine in the form of a changed home page and search engine. The second client that got hit had the browsing history set to auto-delete after each session, so no clue where that one came from other than we are 100 sure it was not from email due to a thorough check of her messages.
In both cases, the malware encrypted a single workstaion and all network shares, however good backup practices allowed full recovery of the important server data in the shares without too much hassle. All local user data was already server side thanks to folder redirection, so the only items left in an un-usable state on the workstations were some readme files (big deal), the default MS sample pictures/videos/music (who cares), and a handful of product manuals/documentation in program files (oh well, they can be re-installed if needed).
It is exactly malware like this that I use as an example as to why good quality redundant backups are extremely important. Workstaion backups are nice, but server backups are absolutely critical.