SOS CYBER BLACKMAIL

Discussion in 'Coin Chat' started by SwK, May 8, 2016.

  1. Rick Stachowski

    Rick Stachowski Motor City Car Capital

    Was this a desktop, or a laptop ?
     
  2. Avatar

    Guest User Guest



    to hide this ad.
  3. Rick Stachowski

    Rick Stachowski Motor City Car Capital

    This is not a " Virus " it's spy ware .
    Viruses infect and spy ware steals ...
     
  4. chascat

    chascat Well-Known Member

    The F B I is currently investigating this as a Global act of terrorism. They urge anyone to call them.
     
  5. Paul M.

    Paul M. Well-Known Member

    Depending on the relative value of what one stands to lose in the worst case, it can be rational to pay a ransom. The scenario doesn't really map very cleanly onto the Prisoner's Dilemma, because the ransoming side has already made their move.
     
  6. Blissskr

    Blissskr Well-Known Member

    I hope no clients financial information was compromised as a result.
     
  7. Burton Strauss III

    Burton Strauss III Brother can you spare a trime? Supporter

    It's unlikely that the ransomware is slurping a lot of files - even on a fast connection (200Mbps) it takes weeks to xfer a terabyte.

    I have not heard that they are doing this, but they certainly could be targetting things like bitcoin wallets, password files (things like lastpass or pasword.txt, .doc, etc.) on an opportunistic basis. Slurp it and If one of a few hundred common passwords opens lastpass, then they have the keys to all your acccounts... if not, next victim.

    To protect yourself, you need to have a multiple tier AND TESTED backup strategy. It's not enough to just backup every few weeks or months. These programs take time to encrypt all your files, time during which the software pretends nothing has happened and silently decrypts files when you open them. Once everything is encrypted that is when you see the ransom request.

    So the routine backups can be backing up already encrypted files. This means you need enough backup storage to hold several weeks worth of copies to ensure you have the latest unencrypted files. Just writing over last nights backup each night isn't going to protect you.

    Ignore the low key sales pitch, this is a good description of how it works... https://www.backblaze.com/blog/cryptowall-ransomware-recovery/ and follow the link to the 3-2-1 strategy
     
    Paul M. likes this.
  8. tulipone

    tulipone Well-Known Member

    The advice given about backups are all sound. Unfortunately it is too late to help you right now though.

    It is also a fact that even if you pay the ransom there is no guarantee you'll get a key or indeed ever hear from them. If I were you and I'll assume no proper backups are available, I'd have a proper think about what I was going to lose and decide if that loss was worth the ransom. Very likely I'd format the drive and restart and go spend the money saved from the ransom on a DECENT backup, remembering that backups can also be infected before the ransom ware is deployed.

    Personnally I use a USB drive for day to day backups, then back up data to bluray every month. It'd still hurt a bit, but I'd stand the hit.
     
  9. SuperDave

    SuperDave Free the Cartwheels!

    At 200Mbps a terabyte will transfer in 12 hours.

    CoinVault ransomware has been broken and is defeatable. The machine in question ought to already be recovered by now; PaulM posted the relevant link yesterday morning.
     
    Paul M. likes this.
  10. desertgem

    desertgem Senior Errer Collecktor Supporter

    If you look in the Kaspersky page and click on the How-to guide, the splash page doesn't match the OP. Did the OP ever report back? Kaspersky says there is also a Rannosh ransom .. and they give the decryptor for that also.

    For those who like to read code, this is an interesting detective story.
    https://securelist.com/blog/research/67699/a-nightmare-on-malware-street/
     
  11. saltysam-1

    saltysam-1 Junior Member

    Also, never leave your computer on when you are not using it. Even in the "sleep mode".
     
  12. saltysam-1

    saltysam-1 Junior Member

    I hope so. I just down loaded the free version. It's a very limited time period. What did they want for the upgrade?
     
  13. SuperDave

    SuperDave Free the Cartwheels!

    I'm far less paranoid about this stuff than I was ten or fifteen years ago. My images are backed up, I have a drive image ready to reload with all current programming, and I used to teach "Format C:" for a living. :)

    I don't even run antivirus any more. Who cares if I run into a malicious site? I can be back up 100% in half an hour.

    And I don't do stupid stuff on the Internet. :)

    You downloaded the wrong version, I think. There's a Free Version which is not proactive, but scans only. There is also a "free trial" of the Premium Version, which includes active ongoing protections, that's good for 2 weeks. I've been using the former since it first hit the streets.
     
    Paul M. likes this.
  14. desertgem

    desertgem Senior Errer Collecktor Supporter

  15. desertgem

    desertgem Senior Errer Collecktor Supporter

    That is the key ..If you know what happens to be stupid.
     
    Paul M. and old49er like this.
  16. old49er

    old49er Well-Known Member

    probably an advanced Trojan hiding as a legit page?
     
  17. Burton Strauss III

    Burton Strauss III Brother can you spare a trime? Supporter

    IF you actually get 200Mbps between the end-points. In fact, while my connection tests out to be that fast, once you leave the blessed realm of the Cable Company network, it's a lot slower. End-to-end to my cloud provider I'm seeing more like 7Mbps.

    Unfortunately most of the other ransomeware programs have learned from the mistake and are using strong crypto. So if you aren't careful, the next time won't be so 'simple'.

    Like everything in life, it's a question of what you are willing & able to risk vs. what you are willing & able to spend.

    If it's really valuable and high risk, you reboot using a CD and make two full backups every night and send one off-site to IronMountain or the ilk. But then you have several dozen multi-terabyte drives to buy and a lot of work to perform.

    Or many other choices, on down to copying your data files to a USB stick a couple times a year when you remember to do it.

    Or do nothing and hope you are lucky - "Sliding down the razor blade of life" as I've heard it described.
     
    Paul M. likes this.
  18. Rick Stachowski

    Rick Stachowski Motor City Car Capital

    One time I wasn't paying attention and there was a flash player update, that downloaded 3 Trojan at once .

    Malewarebytes removed all 3 in a matter of a couple hours of scanning the whole system ..
     
    old49er likes this.
  19. SuperDave

    SuperDave Free the Cartwheels!

    I literally shuddered when I read that. :) Gonna steal it for later use.

    Ransomware isn't about taking your data, anyway, at our level. It's about taking your money. Perhaps a compromised corporation would have data worth stealing, but you and I don't.

    I swear, computing resembles some beginners in numismatics, in one important way: Some just abandon any sense of due diligence and trust anything.
     
    Paul M. and Kentucky like this.
  20. Kentucky

    Kentucky Well-Known Member

    Or do nothing and hope you are lucky - "Sliding down the razor blade of life" as I've heard it described.
    Listen to this one:

     
  21. Kentucky

    Kentucky Well-Known Member

    Several years ago, I had a pop-up that claimed I had been down-loading child pornography and the FBI had taken control...yada, yada, yada... I immediately hit the on/off button on the computer and tried to start it up again...same story, I downloaded Malawarebites from another computer onto a thumbdrive and started my desktop in safe mode, loaded the Malawarebites and ran it and it worked. I just use the free one and as-a-matter-or-fact, just ran it day before yesterday.
     
    Paul M. likes this.
Draft saved Draft deleted

Share This Page