Next us?
|
Quote:
This kind of stuff makes me worry a tad- |
Wow, hope not or hasn't. It's not good business to began with so whose to say when they pay the key works?
|
|
In the link that Germany chris posted a man in the thread mentions:
Quote:
I'm not sure entirely sure how one could perform this type of "isolation" I'm not on a server- Anyone's thoughts on this? @jamison20000e-;) I agree with you. Even if one does pay it may not get rid of the virus. This is another example where intelligent and craftiness have went in the wrong direction- IMO |
Quote:
|
Quote:
|
Quote:
Next us? Backup, backup, backup. |
Quote:
|
Quote:
|
Malware that maliciously encrypts your data ought to be able to run on any operating system ... and the fundamental solution to the problem is the same: a backup program, running continuously in the background, which stores data in volumes and directories that only it is authorized to get to.
The backup software is privileged to search through any directory, but it runs under a user-id that can't be directly logged-in to, and it creates and maintains storage files that only it can read/write. So, you can't tamper with your own backup, and neither can any application running on your behalf. It shouldn't be too difficult to trace this scheme back to the perpetrator, since the bitcoin system actually can be very well tracked. (Since the tokens are one-of-a-kind, they are the perfect "marked(!) bills.") |
From what I've read cryptolocker is an .exe but yes I agree backup, for me it's to Blu-ray every month or so.
|
Quote:
|
If this malware is exe, then this shouldn't affect Linux system. Is this correct? Also, not everybody uses wine and some would even uninstall wine if it were installed by default.
|
If there is a Windows user anywhere on your network you're vulnerable.
|
Quote:
|
All times are GMT -5. The time now is 11:09 AM. |