Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Ceber ransomware attack at work
January 2, 2017 | Gypsy286

Posted on 01/02/2017 6:41:30 PM PST by GYPSY286

Has anyone been attacked by Cerber Ransomware? I work at a small non-profit and was attacked last week. Most people who work here are volunteers and since we are a small non-profit, not much money is available to pay the ransom. What to do, what to do....


TOPICS: Chit/Chat
KEYWORDS: cerber; computers; computing; internet; ransomware; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 next last
To: GYPSY286

Also, if you are lucky enough to still be using Windows 7, right clicking folders and then navigating to properties -> previous versions can bring back the last set of files before you were hit with the ransomware.

sometimes you can go right for high-level folders like My Documents and get everything back. just be sure to use the Copy option and not the Restore option to restore to a separate, new folder, and then manually copy the restored files back to the old folder. You’ll also have to manually delete the encrypted *.cerber files as well.

Using a cerber decrypter tool is the best and easiest way to go, though.


21 posted on 01/02/2017 7:39:02 PM PST by catnipman (Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GYPSY286

The only answer to this crap is to find and kill the people doing this. This includes whoever the virus refers you to in order to purchase the “fix”.
A decent government would be doing this for us.


22 posted on 01/02/2017 7:44:51 PM PST by DesertRhino
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dalberg-Acton

No real description of how the infection occurs. Sounds like it doesn’t attack Linux.


23 posted on 01/02/2017 7:45:09 PM PST by Paladin2 (No spellcheck. It's too much work to undo the auto wrong word substitution on mobile devices.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Paladin2

Does it hit apple systems?


24 posted on 01/02/2017 7:48:11 PM PST by DesertRhino
[ Post Reply | Private Reply | To 23 | View Replies]

To: SpaceBar

Black Ice.

Then catch them and pull their intestines out through their mouth.


25 posted on 01/02/2017 7:49:43 PM PST by reformedliberal
[ Post Reply | Private Reply | To 10 | View Replies]

To: DesertRhino

From posted links upstream, apparently not.


26 posted on 01/02/2017 7:53:12 PM PST by Paladin2 (No spellcheck. It's too much work to undo the auto wrong word substitution on mobile devices.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Paladin2

Ransomware usually attacks through email. “Click here” is all it takes to unleash the ransomware software.

Good, frequent, complete backups can stymie ransomware.

Image the system disk using Macrium Reflect or Todo Backup.


27 posted on 01/02/2017 8:14:43 PM PST by upchuck (Obama once thought that he belonged to the ages. Now he belongs in the rubbish bin. h/t D.Greenfield)
[ Post Reply | Private Reply | To 23 | View Replies]

To: upchuck

I sent ~99.9% of email to the bit bucket. Being retired has its time efficiencies. Besides, I now only run Windows in cloned VirtualBoxes that can be deleted and a new clone generated in minutes.


28 posted on 01/02/2017 8:19:51 PM PST by Paladin2 (No spellcheck. It's too much work to undo the auto wrong word substitution on mobile devices.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: GYPSY286
Even if you pay the ransom you stand a pretty good chance of not getting your computer back.

I got an early ransomware some years ago when I had never heard of such a thing. I went through every tool in the Windows toolbox and finally called in my son when the popups were making it impossible to access anything at all. He worked the mouse and keyboard for over an hour but he cleared the crap out and loaded Malwarebytes. I haven't had any virus or exploit, at least not one that has interfered with my use of the computer (I'm sure NSA has a continually updated mirror of my hard drive) since then.

29 posted on 01/02/2017 8:38:00 PM PST by arthurus
[ Post Reply | Private Reply | To 1 | View Replies]

To: dhs12345

When I got the ransomware I was unable to restore an image.


30 posted on 01/02/2017 8:40:40 PM PST by arthurus
[ Post Reply | Private Reply | To 6 | View Replies]

To: johncatl

I got Cryptowall on a business PC. There was nothing I could do but scrap the system. They had disabled access to all external media and the DVD. Couldn’t reinstall anything.


31 posted on 01/02/2017 8:46:33 PM PST by 1_Inch_Group (Country Before Party)
[ Post Reply | Private Reply | To 11 | View Replies]

To: GYPSY286

Some volunteer clicked on something they shouldn’t have


32 posted on 01/02/2017 9:37:36 PM PST by Nifster (I see puppy dogs in the clouds)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Garth Tater

“3.) As a last possibility, negotiate a price you can pay with the bastards that stole your data. If you can take the time (weeks?) keep in touch with them and offer them what you can and they may eventually decide to accept your offer.”

I’m not sure about this version, but some ransomware has hard deadlines - if you don’t pay up the key is automatically deleted. There’s not a lot of incentive for the bad guys to wait around...


33 posted on 01/02/2017 10:32:15 PM PST by PreciousLiberty (Make America Greater Than Ever!)
[ Post Reply | Private Reply | To 17 | View Replies]

To: conservativepoet; dayglored

Where does Macrium store the image? I have a secondary hard drive on my PC but wouldn’t the malware encrypt that, too?


34 posted on 01/03/2017 2:53:43 AM PST by raybbr (That progressive bumper sticker on your car might just as well say, "Yes, I'm THAT stupid!")
[ Post Reply | Private Reply | To 2 | View Replies]

To: raybbr

” I have a secondary hard drive on my PC but wouldn’t the malware encrypt that, too?”

Me too and I use Cobian backup. I’m thinking I’ll connect my external, make a weekly backup and then disconnect it.


35 posted on 01/03/2017 4:13:17 AM PST by dljordan (WhoVoltaire: "To find out who rules over you, simply find out who you are not allowed to criticize.")
[ Post Reply | Private Reply | To 34 | View Replies]

To: dljordan; raybbr; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; ...
> I’m thinking I’ll connect my external, make a weekly backup and then disconnect it.

Yep, good idea.

Malware, ransomware, etc. ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to raybbr for the ping!!

36 posted on 01/03/2017 4:43:01 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 35 | View Replies]

To: WENDLE

A little harsh isn’t it? You know nothing about what they do and you’re labeling them as a scam! If it was sarcasm it lacked the /s. Otherwise get your head out of your a$$ and tell us how much you gave to charity last year.

Happy New Year /s


37 posted on 01/03/2017 5:51:44 AM PST by Portcall24
[ Post Reply | Private Reply | To 7 | View Replies]

To: GYPSY286

More than likely not “hacked” but someone was traversing porn sites

If you get one of these, just open the task manager and kill all your web browsers.

EVERY FREEPER SHOULD HAVE AVAST ANTI-VIRUS, MALWAREBYTES, and CCLEANER installed


38 posted on 01/03/2017 6:40:24 AM PST by Mr. K ( Trump kicked her ass 2-to-1 if you remove all the voter fraud.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GYPSY286

The same thing you would do if the hard drive just died. Paying the ransom does not ensure you will get the key.


39 posted on 01/03/2017 6:44:26 AM PST by AppyPappy (If you really want to irritate someone, point out something obvious they are trying hard to ignore.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GYPSY286

Many modern ransomware attacks are present in a network for an extended period prior to execution. This ensures that even the backups have a copy of the ransomware tucked away somewhere. If you don’t have regular backups, there’s really nothing you can do outside of paying the ransom.

If you have any server operating systems in your environment, follow published hardening guides, and use the built-in backup utilities (Rsync for Linux, Windows Backup for Windows). Windows Desktops can use Folder History, System Restore, or even wbadmin if they’re stored on replicated network storage. Otherwise, the workstations are likely unrecoverable.

The most you can hope for is to store the infected disks away in a locked cabinet on the off chance that the criminal ring is caught and the decryption key is published.


40 posted on 01/03/2017 6:45:38 AM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson