LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 11-06-2013, 12:45 PM   #1
szboardstretcher
Senior Member
 
Registered: Aug 2006
Location: Detroit, MI
Distribution: GNU/Linux systemd
Posts: 4,278

Rep: Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693Reputation: 1693
CryptoLocker variant


One of our PC's just displayed the red flag of the CryptoLocker ransom-ware. To say the least we were terrified, because of shared drives and the like.

But we lucked out. This is a "CryptoLocker-lookalike" and not the real thing.

After unplugging the PC from the network and forensics had been completed, we surmised that it didn't encrypt any files local or remote, and for some reason the countdown started at 62.5 hours.

It seems to be a scare tactic to cash in on the CryptoLocker scare.
 
Old 11-06-2013, 03:22 PM   #2
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Glad that everything is ok with your system and it wasn't the real thing-

I had a issue of the same resemblance to yours a few weeks ago-

It was the FBI Virus. Insisting that I pay a fee and a few other details I have forgotten since.
My system is fine and I didn't find any files corrupt--

Agreed; it is a scare tactic of some sort-

One of our Guru's: Jefro just posted an article about this:-

I think a public key is needed to infect and w/o it I don't think security is so easily breached.
Someone would have to be well rounded in decryption among other nasty skills to get in-

Correctly encrypting the files on a computer is a safe form of protection, because the process does not depend on the integrity of the operating system after the encryption takes place.

http://www.linuxjournal.com/article/6481
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Change directories without cd? (or a variant) vitop Linux - Newbie 9 01-14-2013 12:17 AM
Is there a modern variant of dsl still around? Indy452 DamnSmallLinux 6 02-10-2011 02:57 AM
command to know OS kernel variant support? linuxunix Linux - Newbie 2 04-28-2010 06:10 AM
Which variant of Linux would be best for me? rob92110 Linux - Newbie 13 05-21-2008 09:15 AM
How many people use Mozilla variant? rajbaxi General 11 03-23-2004 06:51 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 12:53 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration