Sapiens
Member
Phew @ my all Mac ecosystem of machines
Sympathy for folks affected. Brutal, malevolent software design.
Yes! Me too. My one windows installation is purely there fore "just-in-case" situations and is isolated via vmware.
Phew @ my all Mac ecosystem of machines
Sympathy for folks affected. Brutal, malevolent software design.
So in regards to using an external HDD for backing up larger amounts of data automatically, is there any good free options aside from Crashplan. I did check them out but they appear to only offer a free trial.
Small files that 99% of people are concerned with can be easily backed up to the cloud.
All I'm saying is that an automatic solution is infinitely better than a manual backup. No questions asked.
The best backup is one that's up to date and one you actually use.
How does one go about safely automatically backing up to Dropbox, for example. On my PC, I have a Dropbox folder which syncs with my Dropbox cloud storage. So, in the event of my PC getting infected by this malware and my files encryoted, wont the encrypted files from my PC Dropbox folder get copied to the Cloud also?
Whats the best way to avoid this?
CrashPlan have a fully free version.So in regards to using an external HDD for backing up larger amounts of data automatically, is there any good free options aside from Crashplan. I did check them out but they appear to only offer a free trial.
Haven't tried that before. Might as well check it out.
Store all your files on Dropbox. They'll be backed up online. If something like this messes them up, go to the Dropbox website and you can restore an older version of your files. Dropbox keeps many version in case something like this happens. A backup for a backup.How does one go about safely automatically backing up to Dropbox, for example. On my PC, I have a Dropbox folder which syncs with my Dropbox cloud storage. So, in the event of my PC getting infected by this malware and my files encryoted, wont the encrypted files from my PC Dropbox folder get copied to the Cloud also?
Whats the best way to avoid this?
Dropbox saves previous versions of files in case things go wrong, if memory serves. You can get them via the Web interface. I think it's up to 30 days history.
You don't need to click anything to get malware these days
you can get it through banners or any javascript executed on any website, just by opening the page
Posted this on the end of the last page -I'm guessing System Restore wouldn't work? That's brutal
I would not count on this as your only defense.System Restore creates regular restore points and maintains older copies of files using the Volume Shadow Copy service. This is the feature that allows you to restore previous versions of files (Right Click --> Properties --> Previous Versions). Some users have had some success restoring their files using this technique, or a utility called Shadow Explorer.
Many people do not have the Volume Shadow Copy service enabled, so I'd check.
i used to use noscript with FF, but goddamn are the chrome solutions bad.
To be fair, one of the examples given in the reddit thread has a spoofed address from services@citibank, with the only hints to authenticity being the use of the receiver's email address ("Dear, crnaccravens" rather than "Dear John Smith"), some other aberrations in the body, and the attachment named as a .pdf with a pdf icon while it's actually an .exe.
It's certainly carelessness, but it's not exactly flagrant.
As long as MSE is one of the 5, that's good enough for me.everyone crapping on MSE should realize only 5 out of 49 AV's detected this virus as of yesterday morning.
I have been dealing with this damned virus at work since last week -_- (Desktop Support)
It sucks having to explain that the files are lost forever.
Quick question on MB: Is the Pro version just a one-time purchase, or a subscription?
When you update your java you also need to uninstall the old java versions otherwise they can still use the exploit.In addition to the old classic executable in the email trick there are some reports that it's being installed by way of Java exploits. Update your Java if you've got it, peeps.
And don't install the malware toolbar it'll try to foist on you when you do. Truly we in this modern world are singing the song of screwed.
Thanks. Done and done.One time purchase. You might be able to find a voucher code to get it for cheaper too.
It always gives me popups on IP's it's blocked. Never affected me in a negative way so I don't think it has many false positives.
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.
It's a brilliant piece of software.Thanks. Done and done.
I was wondering what the difference was earlier when it said only the Pro version could block it, then I read up and realized the free version (which I've been using since time out of mind) doesn't do real-time scanning, which I never really considered before.
Better safe than sorry, IMO... $25 now is better than a potential $300 or lost files later on. I've got some stuff backed up, but it's mostly there in case of a hard drive failure.
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?
It's good that more people are aware of this, but is there a reason why this is only making the headlines now? Ransomware has been pretty prominent since around 2005, I'm surprised more people are seemingly only becoming aware of it now.
could this fuck up your dropbox/skydrive files by infecting/encrypting the local files and then they'd be synchronised to the cloud?
This thread made me buy MalwareBytes.
I don't think any have been as bad as this. If you aren't adequately equipped/knowledgeable to block it or don't have a decent backup system then you're completely fucked
The only common ransomware that I've seen is that Moneypak thing, and that's still possible to remove. Cryptolocker essentially destroys your files if you don't pay and it's a lot more serious than anything I see on a regular basis.
The podcast that someone here posted said that dropbox wasn't really safe but I would imagine it would be ok providing you don't have the actual program installed on your pc that gives access to it. I know nothing on stuff like this though so I am probably wrong.
This really isn't any worse than many others that have been around before. These types tend to be more rare, since usually they just lock your PC instead of actually encrypting the files, but this isn't really new by any stretch of the imagination. Though I'll admit that my views on this are heavily skewed since I used to analyse many different types malware on a daily basis, almost like a religion; so I guess I've lost touch of how often the average user encounters this sort of thing, which is to say, not very.
So like, assuming that your user does not have admin privileges to alter the files or its permissions, changing file or mount permissions would easily break this, wouldn't it?Added to OP. Also, more info on how it works here:
http://nakedsecurity.sophos.com/2013/10/12/destructive-malware-cryptolocker-on-the-loose/
GAF, you are not prepared for this. Watch what you click.
thanks for this link, I'll definitely put this on the parent's computer next time I'm up.I'll go ahead and recommend the same piece of software that I always do in these types of threads:
Sandboxie
Spend just 5-10 minutes learning the basics of this program, and you'll never* have to worry about any sort of malware again. It's so secure that you could even download a sample of this ransomware and run it for fun. It's not going to be able to do much.
*99% secure. Nothing is 100% when it comes to PC security
As I was typing up a warning email to my co-managers, just realized our entire network is infected. What a joy.
Is there a known list of antiviruses that block this malware? Have all the big ones like AVG, Norton, Kaspersky etc updated their signature files?
Is there a known list of antiviruses that block this malware? Have all the big ones like AVG, Norton, Kaspersky etc updated their signature files?
I was basically about to ask this. Has Windows Defender/MSE been updated to catch this? I'd rather not install a third-party anti-virus.
I was basically about to ask this. Has Windows Defender/MSE been updated to catch this? I'd rather not install a third-party anti-virus.
I've just uploaded a sample of this malware to Virustotal (it scans the file with a bunch of different AV engines and tells you if they detect the file). The results are here:
https://www.virustotal.com/en/file/...0a3c34fc2008e210ccfe6dae/analysis/1382805599/
Pretty much every AV, provided you have the latest updates, will detect it.