Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Pennsylvania Senate Democrats resist ransom in cyberattack
washingtontimes ^ | MARC LEVY

Posted on 03/06/2017 2:11:04 PM PST by davikkm

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-23 next last

1 posted on 03/06/2017 2:11:04 PM PST by davikkm
[ Post Reply | Private Reply | View Replies]

To: davikkm

Stop playing around with the Russians, Democrats!


2 posted on 03/06/2017 2:12:12 PM PST by \/\/ayne (I regret that I have but one subscription cancellation notice to give to my local newspaper.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: davikkm

That might explain why DU was down for a week after the election.
Hmmm


3 posted on 03/06/2017 2:14:22 PM PST by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: \/\/ayne

most likely from logging on to porn sites


4 posted on 03/06/2017 2:15:12 PM PST by KingNo155
[ Post Reply | Private Reply | To 2 | View Replies]

To: davikkm

Ransom ware attacks don’t generally steal the data, they encrypt it. You pay to get the decryption key.


5 posted on 03/06/2017 2:18:38 PM PST by RightGeek (FUBO and the donkey you rode in on)
[ Post Reply | Private Reply | To 1 | View Replies]

To: KingNo155

“most likely from logging on to porn sites”

Since this was the Demondog party it probably had to do with too much pizza delivery.


6 posted on 03/06/2017 2:18:57 PM PST by Fai Mao (I still want to see The PIAPS in prison)
[ Post Reply | Private Reply | To 4 | View Replies]

To: davikkm

The Democrats are going to stand on principle and not pay the ransom.After all it’s THEIR money this time.


7 posted on 03/06/2017 2:19:46 PM PST by Farmer Dean ("Do you want me to shoot,I'm rested.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: davikkm

Usually rasomware encrypts all of one’s data files and then vamooses. Unless you’ve backed up your data offline or you are running W7 pro and have activated and utilized its built-in system protection subsystem, allowed it plenty of space and know how to recover data using Previous Version, then you’re screwed. (BTW, the keys for some ransomware are known and available on the web, and some of the encryption algorithms for other ransomware are known and free tools are available that can figure out the encryption key based on one clear file and one encrypted file and then the key can be used on the rest of ones encrypted files.)

Be that as the above may be, one would think that professional organizations like the PA Dems SHOULD have competent IT staff to keep this kind of crap from happening. I’ve got clients with just a half-a-dozen employees that probably have WAY better protection from badware than the PA Dems.


8 posted on 03/06/2017 2:19:51 PM PST by catnipman ( Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: davikkm
A ransomware attack is typically aimed at stealing sensitive information in an attempt to be paid for the data’s return,

um...
9 posted on 03/06/2017 2:32:38 PM PST by stylin19a (Terrorists - "just because you don't see them doesn't mean they aren't there")
[ Post Reply | Private Reply | To 1 | View Replies]

To: davikkm

Resist we much!


10 posted on 03/06/2017 2:33:44 PM PST by a fool in paradise (patriots win, Communists and Socialist Just-Us Warriors lose)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RightGeek
You pay to get the decryption key.

...which a large majority of the time does not work.

11 posted on 03/06/2017 2:35:16 PM PST by Ingtar (.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Fai Mao

bump


12 posted on 03/06/2017 2:39:55 PM PST by KingNo155
[ Post Reply | Private Reply | To 6 | View Replies]

To: KingNo155
most likely from logging on to porn sites

Pizza porn. It's what demoncraps do.

13 posted on 03/06/2017 2:40:07 PM PST by Sirius Lee (In God We Trust, In Trump We Fix America)
[ Post Reply | Private Reply | To 4 | View Replies]

To: davikkm

Hmmm. Ransom ware TELLS you it has engaged. That’s kind of the point.


14 posted on 03/06/2017 3:04:13 PM PST by lepton ("It is useless to attempt to reason a man out of a thing he was never reasoned into"--Jonathan Swift)
[ Post Reply | Private Reply | To 1 | View Replies]

To: davikkm

The ransom was probably that the Philly soda tax (doubled cost of soda—was effective January 1) be banned by the legislature.

It is really ticking off a lot of folks in that city.


15 posted on 03/06/2017 3:04:31 PM PST by cgbg (Hidden behind the social justice warrior mask is corruption and sexual deviance.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RightGeek

Usually. As I understand, sometimes they will do both, and other things.


16 posted on 03/06/2017 3:06:36 PM PST by lepton ("It is useless to attempt to reason a man out of a thing he was never reasoned into"--Jonathan Swift)
[ Post Reply | Private Reply | To 5 | View Replies]

To: davikkm

their email system is down because it was the door into their network, and they have no idea how widespread the attack was. the rest of their stuff is down because they don’t have backups.

the severity of the damage is directly related to how crappy their network policies are.


17 posted on 03/06/2017 3:07:24 PM PST by JohnBrowdie
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ingtar

in the old days — like, last year — the decryption keys worked surprisingly often. back when there was honor among these guys.


18 posted on 03/06/2017 3:10:04 PM PST by JohnBrowdie
[ Post Reply | Private Reply | To 11 | View Replies]

To: catnipman

if this is the variant that jumps across network shares (and it almost certainly is), you can’t trust that your network is clean until you’ve gone through an agonizing amount of grunt work.

then you have to take into consideration that they don’t attack one or two email addresses that they’ve harvested, they attack as many as they can, and each infected client could theoretically be encrypting away whatever network shares they have access to.

but, step one is to be sure you’re clean. not a simple process.


19 posted on 03/06/2017 3:15:30 PM PST by JohnBrowdie
[ Post Reply | Private Reply | To 8 | View Replies]

To: davikkm

I knew that the Clinton Foundation was desperate, but to eat one’s own young?


20 posted on 03/06/2017 3:36:57 PM PST by SES1066 (Happiness is a depressed Washington, DC housing market!)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-23 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson