Post by irvsp on Oct 25, 2013 14:02:14 GMT
This ONE is for real!!!
Read about it HERE!!!
When I first read about this I searched the web on it. Appeared to be true but there were conflicting reports of people able to get the key needed to unscramble the data that got encrypted. I suspect these posts that said they got it were from the bad guys, or, in some cases they did provide it, if for no other reason that a 'real' person posts they got it and that would make others at least try to get the key by paying.
Not sure there IS a real 'safe' way to defeat this?
First, there is NO sure fire way NOT to get hit. It appears that a Firewall and A/V will not stop it?
How one gets it:
==========
CryptoLocker attacks typically come in three ways:
1) Via an email attachment. For example, you receive an email from a shipping company you do business with. Attached to the email is a .zip file. Opening the attachment launches a virus that finds and encrypts all files you have access to — including those located on any attached drives or mapped network drives.
2) You browse a malicious website that exploits vulnerabilities in an out-of-date version of Java.
3) Most recently, you’re tricked into downloading a malicious video driver or codec file.
===========
OK, in the first case above my ISP has been blocking MANY of these, and so far, none has made it through my ISP (and GMAIL) and if they did, my e-mail scanner, MailWasher Pro, would show it to me and I'd block it.
Second case, interesting, who knows what it uses in Java and IF it gets updated for every Java release?
Last one, hmm... how would one really know?
My, on occasion I have opened up some of the first case files JUST TO SEE what they are, I think I'll stop doing that now.
The 'protection', BASIC one, have a backup... but what if the crooks are smart enough to program scrambling any backup it can find? Also, link states that it will scan all attached drives as well for data to encrypt. I do use Symantec System Restore 2013, and now I move the latest backup (if I remember) to an NAS driver that doesn't have a drive letter.
Advanced one, well, not every version of Windows does have the Group Policy Editor... and I suspect if you make the changes some/most apps you d/l and install from TEMP folders might not install? Have NOT tried the supposed 'fix' though.
Be WARNED, be CAREFUL!
Read about it HERE!!!
When I first read about this I searched the web on it. Appeared to be true but there were conflicting reports of people able to get the key needed to unscramble the data that got encrypted. I suspect these posts that said they got it were from the bad guys, or, in some cases they did provide it, if for no other reason that a 'real' person posts they got it and that would make others at least try to get the key by paying.
Not sure there IS a real 'safe' way to defeat this?
First, there is NO sure fire way NOT to get hit. It appears that a Firewall and A/V will not stop it?
How one gets it:
==========
CryptoLocker attacks typically come in three ways:
1) Via an email attachment. For example, you receive an email from a shipping company you do business with. Attached to the email is a .zip file. Opening the attachment launches a virus that finds and encrypts all files you have access to — including those located on any attached drives or mapped network drives.
2) You browse a malicious website that exploits vulnerabilities in an out-of-date version of Java.
3) Most recently, you’re tricked into downloading a malicious video driver or codec file.
===========
OK, in the first case above my ISP has been blocking MANY of these, and so far, none has made it through my ISP (and GMAIL) and if they did, my e-mail scanner, MailWasher Pro, would show it to me and I'd block it.
Second case, interesting, who knows what it uses in Java and IF it gets updated for every Java release?
Last one, hmm... how would one really know?
My, on occasion I have opened up some of the first case files JUST TO SEE what they are, I think I'll stop doing that now.
The 'protection', BASIC one, have a backup... but what if the crooks are smart enough to program scrambling any backup it can find? Also, link states that it will scan all attached drives as well for data to encrypt. I do use Symantec System Restore 2013, and now I move the latest backup (if I remember) to an NAS driver that doesn't have a drive letter.
Advanced one, well, not every version of Windows does have the Group Policy Editor... and I suspect if you make the changes some/most apps you d/l and install from TEMP folders might not install? Have NOT tried the supposed 'fix' though.
Be WARNED, be CAREFUL!