-
djohns54
at May 07,2015
This is some very sophisticated malware! I can't believe sometimes the lengths that hackers and malware writers go through to steal your money! It amazes me to see how going from stealing your data has become a hold your data for ransom type of business. But whose to say that the malware authors aren't stealing your data anyway just to turn around and hack you again or steal your identity. Every time I find new stories on these types of things, it prompts me to find new ways to keep my data safe. And really the way I have found so far is to use a VM on your host computer as well as house the VM's on an external drive that is bitlocker encrypted and password protected. But in can be a bit of a pain in the you know what to go through all that just to surf the web, but hey this is the world that we live in now!
-
428Mach1
at July 06,2015
Interesting and informative video. Did a report on Cryprolocker in an earlier MS in CFRS class, This satisfied my curiosity as to how it worked (the processes in Task Manager) and how it hid itself. The tip about checking the option to show ALL file extensions was a great suggestion. The reminder to back up one`s system is always a good idea. The video didn`t answer the question of "can the encrypted file be deleted and recovered fro backup" - I assume that it could be. I also wonder if ALL of the files would be encrypted for ransom. The use of Firewalls and anti-virus programs cannot be overstated ! Can we send Seal Team 6 to get these guys ?!
-
tlawless
at July 08,2015
This like most other malware relies on the general lack of awareness of the user and/or administrator of the system. It's not only predatory but extremely effective and difficult to trace back to a source.
-
logybomb
at July 19,2015
I would think the perpetrator of this attack would be fairly easy to find. Definitely not the most sophisticated of attacks, but I guess it would be able to catch someone off guard. I would think someone would rather erase the hard drive, though, than pay out some money to the attacker. In fact, I think that would be the least likely outcome. Yet another reason to invest sometime into computer security.
-
mrgodfrey3
at July 20,2015
This video highlights the importance of offline backups. Often it is worth paying for the decryption keys. Anyone prosecuted for spreading this virus should get 10 ys in prison.