Everyday Cybercrime - and what you can do about it
adamat February 16,2016 In keeping with Brian's point I can't help but think how awful this would be if it happened to someone's dropbox/onedrive/google drive etc. I wonder if there is something that cloud based storage companies can do to prevent this from occurring? As more and more people move towards cloud storage will the reliance on the storage provider to protect against malware also increase? It would be nice if, lets say Google, detects tampering with the gdrive on someone's computer and automatically blacklists that PC to protect it from further tampering. Or maybe a request can be placed by the user to get a backup of the tampered files.
tcmahonyat March 04,2016 Interesting how CryptoLocker has to call home first before a victim's file are encrypted. It would be interesting to see if it was some how possible to intercept the communications and either capture the encryption keys or identify the attacker's endpoints. It would have been interesting to see but I am curious if there is more than one server where the malware got its encryption keys from. If it was simply one than it should be easy to identify the endpoint and monitor/shutdown that attackers server. Easy way for an attacker to make money and I imagine the methods in which these types of malware encrypt a user's files with only get more sophisticated with time.
nickat March 08,2016 This has to be one of the scariest types of malware for the average user, even those with Apple computers considering the recent KeRanger ransomware. This crime strikes me as intensely personal which leaves a victim with little recourse. This type of malware reinforces the need to educate users on some key computer security concepts; backup your files to offline storage, install a quality anti-virus product, and be certain of the websites visited, files opened and emails opened.
fpazdzinat March 10,2016 With nearly all of our information being digital these days, it makes sense that someone will try to hijack and ransom that information. This reminds me of the recent incident when hackers locked down a hospital’s network and wouldn’t release it until the hospital paid a ransom. They ended up paying it because having an incident response team fix the problem would take too long and they had their patient’s lives to worry about. When there’s a time limit on a digital ransom like this, there isn’t much choice. You need to pay the ransom or lose your data. At least he was able to stop the malware and the countdown but he was still left with encrypted files which will probably be almost impossible to break.
haneenat April 12,2016 I've had this type of issue many times when I as younger, and I've never thought that this would be the reason. But at least the files will become secure when they're encrypted.