Posted on 12/25/2013 6:51:56 PM PST by Nachum
A virulent form of ransomware has now infected about quarter of a million Windows computers, according to a report by security researchers. Cryptolocker scrambles users´ data and then demands a fee to unencrypt it alongside a countdown clock. Dell Secureworks said that the US and UK had been worst affected. It added that the cyber-criminals responsible were now targeting home internet users after initially focusing on professionals. The firm has provided a list of net domains that it suspects have been used to spread the code, but warned that more are being generated every day. Ransomware has existed since at least 1989,
(Excerpt) Read more at bbc.co.uk ...
Cyber-criminals all need a 9mm to the back of the head.
Clever little bastards.
http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information#prevent
See “17.How to prevent your computer from becoming infected by CryptoLocker” There’s a free prgram to prevent it.
Cyber-criminals all need Massive, repetitive, concentrated exposure to military grade vomiting agent (an arseicalagent)
I found that Norton sucks, McAfee does a much better job than it did.
Why, the malware might think this is a "Windows" computer somehow and attempt to subtly run an ".exe" or ".com" file here, and THEN where would I be? (Psst! What's a "Windows" computer? "Windows" makes computers?)
Especially since neither of those types of files will run on this computer or any other I have connected to the web, and all personal and critical data is stored on powered-down backup drives and totally inaccessible to any device until I both power them on and then power on the hub to connect them to any computer. Never done when anything is online, and usually with a complete power-off and then restart first while in the meantime making certain that all internet connections are inactive or unpowered.
Next I expect them to set off a "Mac" executable against these machines!
(Please excuse while I go off into a corner and laugh hysterically for awhile...)
That’s quite interesting. Do you recommend it?
Thanks.
And THEN AGAIN on April the First as well as on November the Eighth (Pres Elec Day, I believe, in USA) as well! *grin*
Too bad we can’t ask the NSA to redirect it’s attention for a day or two and locate these scum. They can go back to spying on us after that.
This malware requires use user action to install. They use social engineering to get people to open the attachment.
Now please explain why those non-windows machine are safe if a user approves an action while using an account with admin access?
I can't speak for that person, but I put it on every machine I touch. I've had 3 cryptolocker machines brought to me in the past few months. It's harder than most malware to remove, still easy enough, just a pain.
I wouldn’t waste a 9 on these bastards. .22LR is good enough for the mob and sure as hell is good enough for them.
The few I have seen aren’t actually locking the files, but are adding MSConfig and a switch to the startup menu, effectively blocking that user from changing anything.
If there is an Admin account that you can access, you can go find and remove the MSConfig entry from the affected user account it will fix it.
I wouldn’t waste a 9 on these bastards. .22LR is good enough for the mob and sure as hell is good enough for them.
Who ever created that locks up that window of the browser into full screen so you cant close it without killing the browser process. I recall being able to minimize it though.
But I read that it can really be bad if infected.
How can we use it as a joke?
Cyber-criminals all need a 9mm to the back of the head.
Nah. Ammunition is too expensive. Rope is cheap, reusable, and recycleable.
Was a wake up call... everything I have that is important is on a puter that has never been on-line. I know the trend is to put more and more stuff out there on the cloud but I wont do it..
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.