Every bitcoin transaction is publicly available so it's quite hard to make it 100% untraceable. You can see them at https://blockchain.info/ and if you write in an adress (where you send bitcoins). A bitcoin address looks like this: 19oZXVwrLxbdLQRPEBehgE6ZxKiDkqhFezFrom the Wiki... You can really rack up several millions worth of untraceable dollars through bitcoin? wtf
Eh? My old DDS tapes went offsite, now we backup into the cloud using Mozy Pro.
And that is offsite toó.
it never showed up on the computer as a program, only a service. Thing is , these programs like to make themselves know so people can pay the ransom. this one was just quietly going through each directory she had access to and encrypting files. which is very strange because every account I've seen says that it makes it self known.
What's up with the surprise at paying?
Do you guys realise how much it would cost a business otherwise?
Yea it's stupid but you gotta do shit to minimise losses sometimes.
Cryptolocker targets documents and other user files. A Linux version would be almost as much destructive. Also, most of the infections are done through social engineering (the users themselves are tricked into launching/installed the malware), not arbitrary code execution exploits.
You guys got hit RIGHT after you recently backed up your files?
Why wasn't the guy who opened the file fired?
These people don't rest do they?
![]()
just got this one a min ago.
exampleworddocument.abcdef
what happens if i'm using cloud backup and i get infected with ransomware? will my files get encrypted and then overwritten on my cloud backup?
So apparently it scans for document files and stuff like that (according to the video DieH@rd linked to), so...
WHAT IF:
You make custom extensions for your files, e.g.
A simple .bat files could be used to change any existing files' extensions.
Then choose the program to open it with. I don't know whether Crytolocker checks what files open with, it sounds like it just scans and encrypts various files with certain extensions.
lots of people have already posted what is effective. Including locking app data folders down with GPO, security software on client and email, blocking shady websites, not allowing users to have admin rights.Well.. what would IT gaf do differently? Is there a way to guess nedry's magic word?
and? I'm sorry if I dont think of a local police department is the pinnacle of IT Security. Their IT department deals with the same crap we all do but probably worse since their budget is probably more limited by government.Again, an honest to god actual police department got hit by this and paid the ransom.
No its not. Backups, backups backups. Almost no one likes doing backups, but having good backups will save your ass.lmao at the tons of people in this amazed that they even entertained the idea of paying. Newsflash, its the only way of even having a chance of getting your shit back. The price is pretty low.
You'd be surprised.Well, any competent IT department would be doing proper backups. Getting infected with this would be bad, but it would be just as bad as a hard drive (or RAID controller) failing on the file server, which could happen literally at any time. You might lose a day or two of work but the real wtf here is how many companies are still not running proper backups.
we backup to azure so yea we call it cloud backup.So now we are calling offsite backups cloud as well? That word is dead to me already.
Do you realize a proper company that has an IT department should have a backup solution. Small companies, well i suppose they will learn their lesson eventually.What's up with the surprise at paying?
Do you guys realise how much it would cost a business otherwise?
Yea it's stupid but you gotta do shit to minimise losses sometimes.
Has nothing to do with being disgruntled. I quite enjoy my job. But since when has holding people responsible for their actions become a bad thing? We can tell users not to open shady emails, not go to shady websites, not go to porn sites till we're blue in the face, but when THEY break shit, its always our fault.Yep.
I think GAF just has a lot of disgruntled IT employees that hate their job. In the real world, nobody is getting fired for accidentally getting a virus.
So the virus hits the users "My Documents" folder, which is roaming on the network. Since their files are roaming on the File server, every single file got hit. Everything was inaccessible, users couldn't even login since their "My Documents" amongst other folders were being redirected and now encrypted - errors everywhere.
"checked by Panda Security" Go home Panda you're drunk.These people don't rest do they?
![]()
just got this one a min ago.
I take it you got hit by the fixed version of CryptoDefense (original version had the design flaw of leaving the keys behind, this fact was published and strangely enough the ransomware was fixed)this was a much more advanced version of the software called "crypto defense", it setup shop on one of our administrative assistant's computers. It encrypted one of the network shares on Friday when i caught it in the act. thank God. She was only connected to three network shares.
Turn on show file endings.
I don't understand this bit. The virus encrypts this user's remote files. Why do other users' remote files get encrypted as well?
shared drives.
It sounds like it goes through and tries every directory it can find and if the user has modify permissions on those files it then encrypts them, if they only have read or list then presumably it can't encrypt them. Which would be another point for best practices with user rights and permissions.
Hiding file endings is so stupid. I hate it.
Even if not for security (people could send PDFs that exploit adobe reader's weakness, or whatever), hiding file extensions should not be possible at all.
Money were paid last evening before office closed. The thief honored the deal. All files restored this morning
It was nice doing business with you!
It was nice doing business with you!
So it requires that the infected user have write access on everyone else's files?
That seems like the biggest security flaw; even if your anti-virus is working properly, a disgrunted employee could do significant damage.
Hiding file endings is so stupid. I hate it.
Even if not for security (people could send PDFs that exploit adobe reader's weakness, or whatever), hiding file extensions should not be possible at all.
shared drives meaning like Accounting drive and HR Drive, typically a majority of people do have access to a majority of the files in these shared department drives.
I've never been somewhere where all employees had access to everyone's personal drive.
From the Wiki... You can really rack up several millions worth of untraceable dollars through bitcoin? wtf
They are not untraceable though.
Every bitcoin transaction is completely public, and you can easily trace back the source of funds.
Laundering BTC works the same as laundering real money, just the transaction fee is smaller and the cost to set up new 'accounts' (addresses) is free, so you can send it through more wash cycles.
On the other hand, the block chain is completely publicly available for anyone to data mine and discover your patterns of laundering if you are not very careful, as opposed to bank records, which actually requires law enforcement to do the work to get warrants and such.
Wow, what a necro bump.