LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-13-2015, 04:39 AM   #1
cilbuper
Member
 
Registered: Mar 2008
Posts: 141

Rep: Reputation: 0
Cool Ransomware - encrypting files on windows machines - shady Dateline documentary


Was watching an hour special on malware/ransom ware and it showed how unsuspecting people fall prey by clicking an email or website and then maybe clicking on a popup running on the Win OS. Basically what it showed was a DOS box and it explained that the files were going to be encrypted and warned not to shut off, then it displayed:
Code:
Encrypting "C:\users\user\Documents"
Encrypting "C:\users\user\Desktop"
Encrypting "C:\users\user\Documents"
Encrypting "C:\users\user\Music"
Encrypting "C:\users\user\Pictures"
Encrypting "C:\users\user\Contacts"

All files have been encrypted - do not try to open or copy them as this may lead to permanent deletion...  Blah, Blah, blah

Contact  1234-234231--2341@Baby-I-Want-yo-Money.com to discuss terms to unlock your files
It then displays a screen with a timer countdown until your files are permanently locked.

Each "encryption" line appeared about 5 seconds after the previous line and, IMO it looked like it wasn't encrypting an entire folder (speed is one reason) but also it only lists generic folder names and they seemed just not legit IMO. I would think a simple batch script that displays (echos) what I wrote above, so it isn't really doing anything, just printing that it IS encrypting files, to the screen to scare the user.

When the "security specialist" and reporter contacted the hacker and paid for unlocking, it did the exact same thing as the encryption process but it said "decrypting" instead of encrypting. To me, it looked like an echo command of a batch file. It didn't even look like it pulled the real user account names and just used generic "user" unless that is what the reporter uses.

Has anyone come across one of these scams/blackmails? Did anyone see this "expose" on ransomware (I'll try to find the video, I have it somewhere.


What I REALLY found suspicious was the attitude and behaviour of the IT security specialist. It seemed like his job was fear mongering and stating that these hackers are SOOOO advanced that you have a better chance of squeezing a charcoal briquette into a diamond, with your hand, than getting your data back w/o paying b/c they use "industry accepted best practices for security and encrypting systems, yada-yada - and these hackers are years ahead of the security specialist companies.

I really felt that this security exp was one of the hackers or had some way of benefiting from what he was saying. It just reminded me of parents trying to scare 5-10 year olds of something that wasn't true (to make parents life easier)..

Anyone else see any of these expose/exclusive reports on ransom ware or malware?
 
Old 11-13-2015, 12:23 PM   #2
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
yes, please show us the video.
 
Old 11-13-2015, 01:07 PM   #3
mostlyharmless
Senior Member
 
Registered: Jan 2008
Distribution: Arch/Manjaro, might try Slackware again
Posts: 1,851
Blog Entries: 14

Rep: Reputation: 284Reputation: 284Reputation: 284
If you've ever actually been interviewed by a journalist, you appreciate that a sizable percentage of their work is presentation and theater. So... perhaps what you saw was an attempted depiction of something for which they didn't actually have a recorded session: dramatic reenactment.
 
Old 11-13-2015, 01:20 PM   #4
schneidz
LQ Guru
 
Registered: May 2005
Location: boston, usa
Distribution: fedora-35
Posts: 5,313

Rep: Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918
i heard of it. this one seems similar too:
http://www.linuxquestions.org/questi...re-4175432052/

there is also the ones when a call center calls you saying they are from microsoft and your pc is sending us messages for a free diagnostic. please allow me to remote desktop...
(they show the event-viewer with multiple info dialogs that are normally ignored... please give us your credit card number so we can fix).

edit: i just came across this thread:
http://www.linuxquestions.org/questi...er-4175545802/

Last edited by schneidz; 11-13-2015 at 01:23 PM.
 
Old 11-13-2015, 04:51 PM   #5
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
Apparently ransom-ware has invaded Linux.
http://labs.bitdefender.com/2015/11/...ncryption-key/

Maybe just a sales pitch, but maybe not. The attack vector seems to be through magento, whatever package that is.
 
Old 11-13-2015, 05:50 PM   #6
Sefyir
Member
 
Registered: Mar 2015
Distribution: Linux Mint
Posts: 634

Rep: Reputation: 316Reputation: 316Reputation: 316Reputation: 316
Quote:
When the "security specialist" and reporter contacted the hacker and paid for unlocking, it did the exact same thing as the encryption process but it said "decrypting" instead of encrypting. To me, it looked like an echo command of a batch file. It didn't even look like it pulled the real user account names and just used generic "user" unless that is what the reporter uses.
Ridiculous. Here's what I don't get. While they don't value the data enough to back it up, they value it enough to pay for it once lost.
This isn't something magical, the user broken into has their files encrypted and otherwise deleted. If backups are actually made out of that users permission, restoring is very easy.
Even without backups, it still doesn't seem the system was compromised. Just that user. Which is a very important distinction.
 
Old 11-13-2015, 05:59 PM   #7
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by sgosnell View Post
The attack vector seems to be through magento, whatever package that is.
Web-based Shopping Cart.
 
Old 11-13-2015, 08:10 PM   #8
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,982

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626
I'd bet there are a billion scams a day going on mostly automated. I'd bet it is real and has paid the crooks handsomely for their efforts.

This was quite a stinker for a while. http://www.pcworld.com/article/20840...ansomware.html

There is no OS immune to the hacker.

Last edited by jefro; 11-13-2015 at 08:12 PM.
 
Old 11-14-2015, 04:12 AM   #9
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
bottom line, the threat is real, but it pays to do some web searching before paying anything (the bitdefender article looks good).
magento is some sort of cms.

personally, i never ever had any problem. running my own linux server now, and linux on various machines for years... it always seems to me that common sense (think before you type/install/click) is the best defence. and the power of the community. before i install an obscure app, i look at its github page, what others commented, how the devs reacted, and so on, that usually gives me a reliable picture and a basis for a decision.
what do you think?
 
Old 11-19-2015, 01:24 AM   #10
cilbuper
Member
 
Registered: Mar 2008
Posts: 141

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by Sefyir View Post
Ridiculous. Here's what I don't get. While they don't value the data enough to back it up, they value it enough to pay for it once lost.
This isn't something magical, the user broken into has their files encrypted and otherwise deleted. If backups are actually made out of that users permission, restoring is very easy.
Even without backups, it still doesn't seem the system was compromised. Just that user. Which is a very important distinction.
This is exactly what I thought was going on. Some unsuspecting user sees this stuff on the screen that "looks" real, they are afraid to do anything so they call and pay at which point, the next part of the program displays "decrypting blah blah blah.."
 
Old 11-19-2015, 02:22 AM   #11
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by Sefyir View Post
While they don't value the data enough to back it up, they value it enough to pay for it once lost.
think about selfmade photos and videos.
that is by far the most valuable (*) thing most people store on their machines. they also take large amounts of disk space, and having an external backup disk of equal size is not always an option, financially.

(*) i mean, most likely to pay up because they want it back.

Quote:
Originally Posted by cilbuper View Post
Some unsuspecting user sees this stuff on the screen that "looks" real, they are afraid to do anything so they call and pay at which point, the next part of the program displays "decrypting blah blah blah.."
i guess more than 50% of all windows users hit a wall when they can't open a file because it has a different extension (but is otherwise the same file), so that sort of scenario sounds like "worth a try" for a hacker?
 
Old 11-21-2015, 03:31 PM   #12
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
They put it on the news because they want to backdoor all encryption.

In reality, if you backup your data, keep your system up-to-date, disable vulnerable plug-ins, and don't click random e-mail attachments, you should be fine.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: File-encrypting ransomware starts targeting Linux Web servers LXer Syndicated Linux News 0 11-09-2015 09:30 AM
LXer: Wait, STOP: Are you installing Windows 10 or ransomware? LXer Syndicated Linux News 0 08-01-2015 11:00 PM
LXer: NitroShare: Easily Send Files To Other Machines On The Local Network Linux, Windows LXer Syndicated Linux News 0 07-11-2012 10:30 PM
Communicating between 2 linux machines / windows-lunux machines xombboxer Linux - Newbie 2 03-15-2012 03:57 AM
How do I copy files from a linux machine to a Windows machines? hello321_1999 Linux - Software 11 05-15-2006 01:58 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:27 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration