Announcement

Collapse
No announcement yet.

Well ain't this a bish?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Well ain't this a bish?

    Instead of encrypting files on disk, Petya goes for the jugular by encrypting the entire disk instead, says F-Secure.


    Ransomware Authors Break New Ground With Petya

    Instead of encrypting files on disk, Petya goes for the jugular by encrypting the entire disk instead, says F-Secure.

  • #2
    I fear/loathe the day this happens to anything I'm apart of.

    Comment


    • #3
      No doubt. This type of ransomware is the main reason I use adblocking to prevent drive-by dl's and have CrashPlan constantly running.

      Comment


      • #4
        Interested in being a VIP member and donating to the site? Click here http://dfwmustangs.net/forums/payments.php

        Comment


        • #5
          I wonder how many ransomware applications dont encrypt. I find it hard to believe that many dont because its so easy and fast to encrypt files.

          Comment


          • #6
            I just got back from a customer site Monday that was hit majorly. Some of you may have heard about it on the news. They are still in the process of restoring

            Not this specific version, but one of the other ransomware

            Comment


            • #7
              The scary part to me is that a privileged user on my network can cause the whole shebang to go down if they connect to the VPN and mount a shared drive.

              From what i hear most people just fucking pay the ransom.

              Comment


              • #8
                Originally posted by abecx View Post
                The scary part to me is that a privileged user on my network can cause the whole shebang to go down if they connect to the VPN and mount a shared drive.

                From what i hear most people just fucking pay the ransom.
                Two of the clients we had at the MSP job I worked got hit by CryptoWall. They didn't have backups, either, so they had to pay. Both companies successfully recovered their files, and they both learned very valuable (expensive) lessons from the ordeal.

                I'm curious to know how this one actually works. If it's an executable that's designed to run from the user temp folder like the majority of the others, it would be pretty easy to stop, but there's no 100% sure way to make sure you stop everything.

                KEEP GOOD BACKUPS.

                Comment

                Working...
                X