Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Ransomware victims pay cybercriminals to save family photos
CBC News ^ | March 11, 2015 | David Common

Posted on 03/11/2015 10:42:15 AM PDT by rickmichaels

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-28 last
To: Rodamala

Porn is not so much the case for getting these attacks. There are so many hackers out there that own mis-spelled domain names that look very similar to the home page. For example if you mispell freerepublic you could be sent to a page that drive by installs this junk. Even legitimate websites are pulling this trick now. How many times have you seen the “WARNING, your Adobe is out of date and needs to be updated.” I get that one if I visit Hotair and Townhall, both of which I have stopped visiting. A less experienced computer person will see these warning and click on “yes” or “install.”


21 posted on 03/11/2015 12:00:01 PM PDT by Organic Panic
[ Post Reply | Private Reply | To 16 | View Replies]

To: rickmichaels; ShadowAce

There is no easy way to prevent this in the short term - In fact, folks with responsible backup habits are more susceptible to ransomware than are the schlepps who are lucky to backup quarterly, as one is very likely to commit a backup before you know the files are encrypted, thus overwriting the files in your backup store... The fact that they left their USB HDD plugged in is almost incidental to the fact. These bugs will also infect any writeable network share too, so network backup, even cloud backup, is just as likely to be overwritten with encrypted files, all the more so if backup routines are often executed.

A ‘pull’ oriented (rather than ‘push’) backup initiated by a server pulling files from client machines to read-only shares would eliminate the chance of infection over LAN, but doesn’t do anything for overwriting with encrypted files from the client... But that is half the battle...

Creating a dated backup from the store before initiating a new backup would certainly help, but now you have the problem of giant datastores essentially without incremental differentiation...

It’s a tough nut for automated backup.


22 posted on 03/11/2015 12:10:10 PM PDT by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: roamer_1
We had this infect a PC and a network share at my work recently. Luckily the user that got infected let us know right away, and we were able to quarantine the PC and restore the network share from back (also before anyone else clicked on anything in that share to further spread it).

At home - If you are running 7 or 8, and your profile has 'Admin' privelages, create another admin account that you won't actively use and then demote your current user account to 'Standard'.

You can further restrict what applications you can run by enabling Parental Controls and creating an application 'white list', so that the O/S will only allow specific .exes (or other executables) to run. This makes it virtually impossible for a payload to execute the ransomware (or any virus for that matter).

From the MS website.

Open Parental Controls by clicking the Start button Picture of the Start button, clicking Control Panel, and then, under User Accounts and Family Safety, clicking Set up parental controls for any user.‌ Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

Click the name of the person you want to prevent from using specific programs.

Under Parental Controls, click On, enforce current settings.

Click Block specific programs.

Click Person's name‌ can only use the programs I allow. Select the programs that you want to allow. If the program you want doesn't appear in the list, click Browse to locate the program.
23 posted on 03/11/2015 12:50:01 PM PDT by wareagle7295
[ Post Reply | Private Reply | To 22 | View Replies]

To: rickmichaels
"They had backed up their data on an external hard drive, but kept it plugged in to the computer, allowing it to become infected along with the rest of the computer."

I too use and external hard drive, but always keep in disconnected when I am not directly using it. I also back up my photos in cloud storage and on flash drives kept in my bank safety deposit box. I also have my old photo negatives in the safety deposit box.

24 posted on 03/11/2015 12:58:26 PM PDT by The Great RJ (Pants up...Don't loot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pearls Before Swine

My old-school leetspeek comes out of hiding! Oh Noes!


25 posted on 03/11/2015 1:07:45 PM PDT by Rodamala
[ Post Reply | Private Reply | To 17 | View Replies]

To: Organic Panic

Clicking “Yes” to those update things, is pretty much an equivalent of saying “Sure, officer, you can come right on in and search my home, I have nothing to hide! Warrant? You don’t need no warrant! Come on in! Welcome!”


26 posted on 03/11/2015 1:11:24 PM PDT by Rodamala
[ Post Reply | Private Reply | To 21 | View Replies]

To: wareagle7295
We had this infect a PC and a network share at my work recently. Luckily the user that got infected let us know right away, and we were able to quarantine the PC and restore the network share from back (also before anyone else clicked on anything in that share to further spread it).

Mine is a slightly different task - I am a service tech, primarily for Residential and SOHO users. Since there isn't the 'benefit' of a locked-down client/server oriented LAN, exposure is quite a bit higher. In my line of work, infections are inevitable (think teenagers). So while security is primary, the secondary or fallback position is to make certain that backups are available. Since many of my users are never going to do anything even as complicated as writing a CD, and since data stores have become gigantic (far too big for regular manual backup, even if they were so-inclined), I have relied heavily upon multiple chains of automated backup to provide reliable backup sets in case of electronic disaster (which, in your average teenage infested household, or party-oriented young adult, is a matter of 'when' not 'if'...).

So to me, the problem here is not the infection, which can be considered as inevitable, but rather, how to preserve those backups which, because of their necessary automation, are highly susceptible not only to the bug encrypting the files in backup, but are equally susceptible to good files in backup being overwritten by encrypted files from the live data (if a backup routine initiates before I am notified, or before I can get there). It's a whompin' big problem.

27 posted on 03/12/2015 10:26:16 AM PDT by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: dfwgator
Buy an external drive, save all of your precious files, and store the drive in a safe, only to be used in emergencies.

I have three 2-TB external drives that I occasionally do my backups to... and keep them in a drawer when not in use. I also have three older 1-TB drives with older backups on them.

When I moved cross-country a year ago I mailed one drive, put one on the moving truck and carried the third one with me on the plane. Never can be too careful with my stuff (mostly photos).

28 posted on 03/12/2015 10:32:18 AM PDT by Cementjungle
[ Post Reply | Private Reply | To 4 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-28 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson