Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Ceber ransomware attack at work
January 2, 2017 | Gypsy286

Posted on 01/02/2017 6:41:30 PM PST by GYPSY286

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 last
To: AppyPappy

Believe it or not, most of these criminal outfits will provide a decryption key when the ransom is paid. If it became public knowledge that they weren’t providing the keys, at some point their income stream would stop. End users are not complete idiots. If it’s publicly known a ransom won’t produce results, why pay?

It’s also important to note that more than half of ransomware victims are reinfected within a year of the initial hit. You HAVE to educate your users. They are the first line of defense and often the reason for the infection to begin with.


41 posted on 01/03/2017 6:49:38 AM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 39 | View Replies]

To: rarestia

We found that some of the ransomware bandits had already changed contact info and couldn’t be reached.


42 posted on 01/03/2017 6:53:05 AM PST by AppyPappy (If you really want to irritate someone, point out something obvious they are trying hard to ignore.)
[ Post Reply | Private Reply | To 41 | View Replies]

bfl


43 posted on 01/03/2017 6:54:24 AM PST by DoodleDawg
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy

Report your experience to the FBI. They catalog this stuff and should be involved. They can publish entities known to not provide a key which can save companies a lot of money if they get infected.


44 posted on 01/03/2017 7:03:09 AM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 42 | View Replies]

To: rarestia

If the FBI knows they can provide a key, they also know how to find them.


45 posted on 01/03/2017 7:04:48 AM PST by AppyPappy (If you really want to irritate someone, point out something obvious they are trying hard to ignore.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: conservativepoet

bookmark


46 posted on 01/03/2017 7:31:10 AM PST by granite (The heart of the wise inclines to the right, but the heart of the fool to the left - Ecc 10:2)
[ Post Reply | Private Reply | To 2 | View Replies]

To: GYPSY286
You question lacks many details which are needed for more precise answers.

Did you do a complete drive back up, or at least company (versus system) files?

Do you have a restore disk for your operating system?

Where are the back ups located?

47 posted on 01/03/2017 8:10:51 AM PST by daniel1212 ( Turn to the Lord Jesus as a damned and destitute sinner+ trust Him to save you, then follow Him!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy

Not true. You’re missing a step here. If a company pays the ransom and the criminals provide a decryption key, then there’s “good faith” that the criminals will make the exchange.

If a company pays the ransom but the criminals cut and run with the money, there’s precedent that paying the ransom doesn’t make the situation better. If this is disseminated, then companies will stop paying the ransom and live with the fact that their data is lost. Eventually, the criminals lose. All they’re doing is inconveniencing someone. They’re no different than a virus writer or spammer.

The FBI acts as a central point for dissemination of that information. They don’t have to know where the criminals reside, just who they are, the ransomware variant, and whether or not they provide the decryption key upon payment.


48 posted on 01/03/2017 8:38:15 AM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 45 | View Replies]

To: johncatl
Carbonite has at least three versions of the backup availabe. They also have the capability to do an image backup which is a complete copy of the entire hard drive but this requires a local external drive connected to the PC

I paid for Carbonite and had an attack after a couple of years. They were unable to retrieve anything because I could not come up with a password they required.

49 posted on 01/03/2017 9:23:32 AM PST by JimRed (Is it 1776 yet? TERM LIMITS, now and forever! Build the Wall, NOW!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: GYPSY286

My company is attacked by cryptolocker all the time. We’re an enterprise with 2000+ PC’s though. We fortunately have daily commvault backups and snapshots taken multiple times a day. We can quickly restore the network file locations from earlier backups. We end up just re-imaging the actual PC though to get rid of it.


50 posted on 01/03/2017 9:53:20 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 1 | View Replies]

To: raybbr

Sorry, to take so long and answer. Haven’t been on computer much.

You can put the image anywhere you like. You could put it on an external drive that you leave disconnected for times like this.

I would first reformat the HD using a Windows 10 iso on disc or whatever Windows version you have.

Then use Macrium USB or DVD to start the re-imaging of your C:Drive to restore the image and “valuables.”


51 posted on 01/03/2017 11:24:52 AM PST by conservativepoet
[ Post Reply | Private Reply | To 34 | View Replies]

To: arthurus

Wow. Do you have another act on the machines. You may be able to log in from the other act and clean it that way.


52 posted on 01/03/2017 11:27:36 AM PST by dhs12345
[ Post Reply | Private Reply | To 30 | View Replies]

To: Portcall24

I paid taxes. All Charity.


53 posted on 01/03/2017 12:33:52 PM PST by WENDLE (I urge the appontment of TED CRUZ to the Scalia seat on SCOTUS.)
[ Post Reply | Private Reply | To 37 | View Replies]

To: GYPSY286

Get malwarebytes for the next time.
They say they can stop ransomware.
https://www.malwarebytes.com/premium
“Four layers of malware-crushing tech. Smarter detection. Specialized ransomware protection”.


54 posted on 01/03/2017 12:56:32 PM PST by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies]

To: raybbr

I back up everything on a secondary internal hard drive and a series of flash drives. Important files I email to myself as an attachment.

I got hit with ransomware once.


55 posted on 01/03/2017 1:15:34 PM PST by Loud Mime (Liberalism: Intolerance masquerading as tolerance, Ignorance masquerading as Intelligence)
[ Post Reply | Private Reply | To 34 | View Replies]

To: GYPSY286

Hoepfully, you backed up all your files somewhere, so that you can presumably either format your hard drive or replace it, then load the unencrypted files back onto it.


56 posted on 01/03/2017 5:13:38 PM PST by Tolerance Sucks Rocks (Hey, New Delhi! What the hell were you thinking???)
[ Post Reply | Private Reply | To 1 | View Replies]

To: arthurus

Nah. I let my son do it with his digital magic. He reset something inside the box and regained control of the keys and from then it was his fingers and skill. I don’t know where he comes by that. There is nothing like an engineer in the family lines and he has had no training beyond his own fiddling.


57 posted on 01/03/2017 6:21:13 PM PST by arthurus
[ Post Reply | Private Reply | To 30 | View Replies]

To: dayglored

Hmmmm ..?? I’ve never had malware or ransomeware, etc. I also have a program that signals me whenever I receive a “phishing” email.

It’s awesome.


58 posted on 01/03/2017 7:16:12 PM PST by CyberAnt (Peace through Strength)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Tolerance Sucks Rocks

Thanks to all for the info/suggestions. Went to work today and all files were recovered without paying those &^^&^*% a dime. Apparently Carbonite techs used a backup. Around 10:30 am I received an “unknown name” email notification. Didn’t touch it and email was not found in my list of unread emails.Guess they won’t stop.


59 posted on 01/03/2017 8:00:07 PM PST by GYPSY286 (Politicians must USE their heads or Americans will LOSE their heads.)
[ Post Reply | Private Reply | To 56 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson