Posted on 11/09/2015 10:18:51 AM PST by sparklite2
Power Worm infects Microsoft Word and Excel files but the latest poorly written update of it goes after many more types of data files it finds on a victim's machine.
Malware researcher Nathan Scott discovered the variant and uncovered the mistakes its creator made when updating it.
Mr Scott believes the errors arose when the creator tried to simplify the decryption process. They tried to make it use just one decryption key but mangled the process of generating it. As a result, there is no key created for the files it encrypts when it compromises a computer.
(Excerpt) Read more at bbc.com ...
you just can’t find good hackers these days.
It’s crap like this that gives extortion a bad name.
I would hate to think that people involved in criminal extortion would be liars as well.
Make sure you have
1)Avast Anti-Virus
2)MalwareBytes
3) CCleaner
AND USE THEM!
They are all free for home use and are the best
If you get one of these ransomware threats immediately shut off the power on your computer- it usually stops it from doing any damage and you can reboot normally
DONT CLICK ON ANYTHING
That's exactly why we need more H1-B visas!
</sarc>
MSNBC GUEST: PEOPLE WITH CRIMINAL RECORDS ARE DISCRIMINATED AGAINST.
-PJ
Another must have is SpyBot.
I seriously support the death penalty for hackers who release such malware. Any age, nationality, etc. No excuses, no appeal.
I would pull the trigger, push the plunger, spring the trap door, flip the electric switch, twist the garrote, crack the four horses on the ass, whatever.
These menaces make life suck more and cost everyone hundreds of millions of dollars. Yes, I would kill you over my digital music and photos.
They suck, but at least they don’t call me every day claiming to be Kevin with news about my credit cards.
As a software developer I can easily see how that could happen.
Most developers left to their own devices will not thoroughly test software. Hell, self testing is both boring and humbling. The permutations and combinations are almost endless.
I just use ESET and common sense.
Solid point. I would hope they would watch what happened to the hackers and change their ways.
Ghostery and NoScript
Integration with billions of lines code written by millions of peeps seems impossible.
To read more, here is very informative info: CryptoLocker Ransomware Information Guide and FAQ
I do not know if this new ransomware operates the same way, but I'm guessing maybe it does in which case CrytoPrevent (there is a 'free' product) would be useful to have - I run it on my computers after a relative's business got ransomware (put them down for a week) & someone I know got it on their personal computer.
It is my understanding that if your backups are connected to your computer, they will be encrypted as well.
From link:
When you discover that a computer is infected with CryptoLocker, the first thing you should do is disconnect it from your wireless or wired network. This will prevent it from further encrypting any files. Some people have reported that once the network connection is disconnected, it will display the CryptoLocker screen.
Better Yet Mr K is to have a robust GoBack system like rollbackRX
Virus hits? Do a rollback before windows starts up, virus is completely gone and you are back up and running
NO NO NO NO NO!!!!!!!!!!!!!!!!!!!!!
They must be tortured first.
any defense against this malware?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.