Started By
Message

re: WARNING: Just had a Ransom Ware attack on my computer

Posted on 5/23/16 at 10:53 am to
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 5/23/16 at 10:53 am to
quote:

i didnt know certain thresholds must be met for it to be relevant


There isn't. I just wanted to demonstrate that the real threat, as it stands today, to the platforms is not equal.
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 5/23/16 at 10:56 am to
quote:

There isn't. I just wanted to demonstrate that the real threat, as it stands today, to the platforms is not equal.


i agree 100% there, they are certainly not equal.
Posted by whodatdude
Member since Feb 2011
1374 posts
Posted on 5/23/16 at 11:05 am to
As a sort of preventative measure that I use for files, I always recommend partitioning part of your drive specifically for storage and encrypting it.

Should your windows/OS partition get infected, it's easy to simply and wipe/restore/reinstall on the OS Partition. As long as your storage partition is encrypted, your files should be safe from most malware or ransom ware.
Posted by CE Tiger
Metairie
Member since Jan 2008
41584 posts
Posted on 5/23/16 at 11:08 am to
you will know when you are infected. every image and audio file along with microsoft office files will become encrypted and when you try and open you get gibberish on your screen telling you these things
Posted by whodatdude
Member since Feb 2011
1374 posts
Posted on 5/23/16 at 11:18 am to
Obviously. I've had my run-ins with ransom ware and lost important files like OP.

That is why I separate my music, images, documents, etc into it's own "storage" partition that is in no way linked to the OS. If the OS gets infected, my pictures and the like are protected.

Good explanation here:

"Having at least two partitions - one for the operating system and one to keep your personal data, will assure the fact that whenever your are forced to reinstall the operating system, your data will remain untouched and you will be able to access it."

LINK
Posted by 756
Member since Sep 2004
14867 posts
Posted on 5/23/16 at 12:33 pm to
Look into ESET your protection will be stronger
Posted by LSURussian
Member since Feb 2005
126962 posts
Posted on 5/23/16 at 4:49 pm to
quote:

So you followed the third link "within" a page you found doing a Google search?
No, my search resulted in several articles from different sources. I read the articles from the first two search result links and then had just clicked on the third search result link article when the attack happened.
Posted by LSURussian
Member since Feb 2005
126962 posts
Posted on 5/23/16 at 4:52 pm to
quote:

As a sort of preventative measure that I use for files, I always recommend partitioning part of your drive specifically for storage and encrypting it.

Should your windows/OS partition get infected, it's easy to simply and wipe/restore/reinstall on the OS Partition. As long as your storage partition is encrypted, your files should be safe from most malware or ransom ware.
That sounds like a great idea.

I sure wish I knew what it means.....
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 5/23/16 at 5:44 pm to
quote:

As long as your storage partition is encrypted, your files should be safe from most malware or ransom ware.


That would be pretty inconvenient, as the files would only be protected as long as the volume isn't mounted (decrypted), during which time, you can't use them. It would be simpler to put it all on an external drive that you power up only when in use.
Posted by civilag08
Member since Feb 2011
806 posts
Posted on 5/23/16 at 9:45 pm to
another way that may help to mitigate malware in general is to run whatever browser you use in "sandbox".

A decent option to sandbox if you are on a windows,

LINK /

you can read about how it works if interested.

another option to sandbox would be to install another OS like linux on a virtual machine like vmware virtual player. Note however that performance will suffer a bit if you cannot afford to allocate much RAM towards its. It works better to have 8Gb ram on your main computer to allocate at least 4Gb while its running.

LINK /

Also, don't browse the internet as a user with Admin privileges if you had been. Create a standard account with lower privileges. That way, if it gets compromised, it makes it more difficult for any program to gain full access to the computer and you can delete that user with a higher privilege account.
Posted by whodatdude
Member since Feb 2011
1374 posts
Posted on 5/24/16 at 10:27 am to
Inconvenient, not as much as you make it out to be, but in a sense, yes. However, for peace of mind knowing my files are protected, I can deal with a little inconvenience. Mounting partitions is pretty simple, even with encryption.

I do recommend putting everything on an external as a backup, but often people don't want to have to haul one around to access their files.

The simplest option is to designate a folder to be uploaded to cloud-based storage (i.e. syncing with Google Drive). They give up to 15GB of free storage.

Posted by Jim Rockford
Member since May 2011
98188 posts
Posted on 5/24/16 at 10:29 am to
I got one of those one time.



But I'm running Linux, so I just killed my browser session and started over
Posted by stat19
Member since Feb 2011
29350 posts
Posted on 5/24/16 at 10:36 am to
quote:

8,000 Macs were affected


That's close to the total sum of Macs in the business world - world wide.
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 5/24/16 at 10:44 am to
quote:

Also is there a way to prevent it?


Outdated or unpatched Java implementations are apparently the #1 attack vector for Ransomware.
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 5/24/16 at 10:46 am to
quote:

That's close to the total sum of Macs in the business world - world wide.


har har. I'm pretty sure if a hacker is attacking via BitTorrent client they aren't going after business machines.
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 5/24/16 at 11:15 am to
quote:

Inconvenient, not as much as you make it out to be, but in a sense, yes. However, for peace of mind knowing my files are protected, I can deal with a little inconvenience. Mounting partitions is pretty simple, even with encryption.


You also have to remember to unmount when you're through, and you better be quick about it.

quote:

I do recommend putting everything on an external as a backup, but often people don't want to have to haul one around to access their files.


I wasn't recommending that approach, just suggesting it as a similar alternative.

quote:

The simplest option is to designate a folder to be uploaded to cloud-based storage (i.e. syncing with Google Drive). They give up to 15GB of free storage.


I have multiple backup sets using bare drives. I keep one set off-site and rotate it regularly. They are for disaster recovery.

My approach to malware is to not get any, which I've managed to do since before the first virus was written, despite never running realtime antivirus software. I do use full disk encryption on all my drives, but it's to protect my data at rest, i.e. against physical theft. I do run Firefox with uBlock Origin and Noscript, I uninstalled Flash a long time ago, and I load suspect sites or sites that draw in too much stuff to try to whitelist in a VM. I've never had malware in the VM, either. I don't download and run random crap, and somehow, I've managed to avoid the drivebys. I'm either the luckiest bastard alive, or I'm doing something right. Either way, I have sufficient backups to recover.
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 5/24/16 at 11:45 am to
quote:

Outdated or unpatched Java implementations are apparently the #1 attack vector for Ransomware.



i'd argue that unpatched (or patched sometimes) versions of adobe products (mainly flash) are the #1 attack vector for ransomeware
Posted by ell_13
Member since Apr 2013
85039 posts
Posted on 5/24/16 at 12:18 pm to
The latest VMWare is browser based and requires Java. I couldn't believe they would move away from a stand alone GUI. Although you can still use the old version for administration.
This post was edited on 5/24/16 at 12:19 pm
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 5/24/16 at 12:22 pm to
quote:

The latest VMWare is browser based and requires Java. I couldn't believe they would move away from a stand alone GUI.


Any details on that? Player 12, which I use, is standalone, no Java.
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 5/24/16 at 12:28 pm to
VMWare outsourced the development of desktop virtualization products to china back in January....

may wanna switch to VBox. just sayin...
first pageprev pagePage 2 of 3Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram