Free Republic
Browse · Search
General/Chat
Topics · Post Article

For those unfamiliar with cryptolocker, see these threads posted earlier:

Moral to the story: back up your data regularly and put an air gap between your live data and your backup.

1 posted on 11/21/2013 2:56:18 AM PST by markomalley
[ Post Reply | Private Reply | View Replies ]


To: markomalley

A bigger moral - don’t trust a bunch of dumb doughnut eaters to handle your computer security.


2 posted on 11/21/2013 3:01:52 AM PST by Slump Tester (What if I'm pregnant Teddy? Errr-ahh -Calm down Mary Jo, we'll cross that bridge when we come to it)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: markomalley

Good article, thanks for posting.


3 posted on 11/21/2013 3:14:07 AM PST by leapfrog0202 ("the American presidency is not supposed to be a journey of personal discovery" Sarah Palin)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: markomalley
"The virus is not here anymore," Ryan said. "We've upgraded our antivirus software. We're going to try to tighten the belt, and have experts come in, but as all computer experts say, there is no foolproof way to lock your system down."

...While not foolproof, upgrading  to Linux would go a long way to resolve their virus issues.  I doubt they're up to using it though. I'd prefer they keep using windows so they can spend more time worring about viruses than violating our rights.

6 posted on 11/21/2013 6:49:12 AM PST by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: markomalley

“Apart from not being a fool that is. Cryptolocker primarily spreads via email attachments, typically a PDF that claims to be from a government department or delivery service.”

I got one of those a couple weeks ago. Almost fell for it as I was expecting packages from Amazon. But there were some tells that made me suspicious.


16 posted on 11/21/2013 10:23:53 AM PST by PLMerite (Shut the Beyotch Down! Burn, baby, burn!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: markomalley

Prevention is easier than the cure.

Foolishit offers the free CryptoPrevent tool which writes over 200+ restrictions to the Windows Software Policies folder. They will prevent Cryptolocker from installing itself in defined locations AND from encrypting files.

HitmanPro offers the free HPAlert tool - this will watch your files without need for user intervention and will block ANY suspicious executable that attempts to modify Windows files. Even if downloaded, Cryptolocker cannot run and encrypt files. The malware can then be safely deleted.

You can harden Windows against malware infection by installing both Blue Coat K9 Web Protection and block all known malware domains and servers and SpywareBlaster, to which one can add a custom blocklist to shut out all known malware domains and servers. If they can’t reach your PC, they can’t drop and run malware without your knowledge.

Never download files from addresses you don’t know and and scan all e-mail attachments that are downloaded prior to running them.

Keep your AV always up to date. And install all Microsoft Windows updates that can address ransomware threats.

Stay safe online and happy computing!


31 posted on 12/24/2013 5:29:13 PM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson