Log in or Sign up
Coin Talk
Home
Forums
>
Coin Forums
>
Coin Chat
>
SOS CYBER BLACKMAIL
>
Reply to Thread
Message:
<p>[QUOTE="Burton Strauss III, post: 2416853, member: 59677"]It's unlikely that the ransomware is slurping a lot of files - even on a fast connection (200Mbps) it takes weeks to xfer a terabyte.</p><p><br /></p><p>I have not heard that they are doing this, but they certainly could be targetting things like bitcoin wallets, password files (things like lastpass or pasword.txt, .doc, etc.) on an opportunistic basis. Slurp it and If one of a few hundred common passwords opens lastpass, then they have the keys to all your acccounts... if not, next victim.</p><p><br /></p><p>To protect yourself, you need to have a multiple tier AND TESTED backup strategy. It's not enough to just backup every few weeks or months. These programs take time to encrypt all your files, time during which the software pretends nothing has happened and silently decrypts files when you open them. Once everything is encrypted that is when you see the ransom request.</p><p><br /></p><p>So the routine backups can be backing up already encrypted files. This means you need enough backup storage to hold several weeks worth of copies to ensure you have the latest unencrypted files. Just writing over last nights backup each night isn't going to protect you.</p><p><br /></p><p>Ignore the low key sales pitch, this is a good description of how it works... <a href="https://www.backblaze.com/blog/cryptowall-ransomware-recovery/" target="_blank" class="externalLink ProxyLink" data-proxy-href="https://www.backblaze.com/blog/cryptowall-ransomware-recovery/" rel="nofollow">https://www.backblaze.com/blog/cryptowall-ransomware-recovery/</a> and follow the link to the 3-2-1 strategy[/QUOTE]</p><p><br /></p>
[QUOTE="Burton Strauss III, post: 2416853, member: 59677"]It's unlikely that the ransomware is slurping a lot of files - even on a fast connection (200Mbps) it takes weeks to xfer a terabyte. I have not heard that they are doing this, but they certainly could be targetting things like bitcoin wallets, password files (things like lastpass or pasword.txt, .doc, etc.) on an opportunistic basis. Slurp it and If one of a few hundred common passwords opens lastpass, then they have the keys to all your acccounts... if not, next victim. To protect yourself, you need to have a multiple tier AND TESTED backup strategy. It's not enough to just backup every few weeks or months. These programs take time to encrypt all your files, time during which the software pretends nothing has happened and silently decrypts files when you open them. Once everything is encrypted that is when you see the ransom request. So the routine backups can be backing up already encrypted files. This means you need enough backup storage to hold several weeks worth of copies to ensure you have the latest unencrypted files. Just writing over last nights backup each night isn't going to protect you. Ignore the low key sales pitch, this is a good description of how it works... [url]https://www.backblaze.com/blog/cryptowall-ransomware-recovery/[/url] and follow the link to the 3-2-1 strategy[/QUOTE]
Your name or email address:
Do you already have an account?
No, create an account now.
Yes, my password is:
Forgot your password?
Stay logged in
Coin Talk
Home
Forums
>
Coin Forums
>
Coin Chat
>
SOS CYBER BLACKMAIL
>
Home
Home
Quick Links
Search Forums
Recent Activity
Recent Posts
Forums
Forums
Quick Links
Search Forums
Recent Posts
Competitions
Competitions
Quick Links
Competition Index
Rules, Terms & Conditions
Gallery
Gallery
Quick Links
Search Media
New Media
Showcase
Showcase
Quick Links
Search Items
Most Active Members
New Items
Directory
Directory
Quick Links
Directory Home
New Listings
Members
Members
Quick Links
Notable Members
Current Visitors
Recent Activity
New Profile Posts
Sponsors
Menu
Search
Search titles only
Posted by Member:
Separate names with a comma.
Newer Than:
Search this thread only
Search this forum only
Display results as threads
Useful Searches
Recent Posts
More...