[quote]The portal was created after security researchers grabbed a copy of Cryptolocker's database of victims.[/quote]
I'm more curious about how the security experts got the database
people who make this shit are lower than scum
[QUOTE=B!N4RY;45607297]I'm more curious about how the security experts got the database[/QUOTE]
[quote]In late May, law enforcement agencies and security companies seized a worldwide network of hijacked home computers that was being used to spread both Cryptolocker and another strain of malware known as Gameover Zeus.
This concerted action seems to have prompted an attempt by the gang to ensure one copy of their database of victims did not fall into police hands, said Mr Sandee.
What the criminals did not know, he said, was that police forces and security firms were already in control of part of the network and were able to grab the data as it was being sent.[/quote]
Oh oops, I must've skimmed pasted it.
Cryptolocker is scary shit man, there is literally no other way to get your information back, unless you backed up EVERYTHING.
rogueamp even recommended paying for it if the stuff on your computer's value is more than the ransom.
[QUOTE=GentlemanLexi;45608675]Cryptolocker is scary shit man, there is literally no other way to get your information back, unless you backed up EVERYTHING.
rogueamp even recommended paying for it if the stuff on your computer's value is more than the ransom.[/QUOTE]Yeah, Cryptolocker doesn't fuck around. Most ransomware just locks your desktop without actually touching your files.
Makes an interesting question for me: If you get caught in one of those viruses, where your files get locked rather than deleted, and you can't meet the condition to unlock them, should you keep that locked drive's content in case something like this happens? Or should you just move on, hoping that you got a backup somewhere?
[QUOTE=Coment;45610088]Makes an interesting question for me: If you get caught in one of those viruses, where your files get locked rather than deleted, and you can't meet the condition to unlock them, should you keep that locked drive's content in case something like this happens? Or should you just move on, hoping that you got a backup somewhere?[/QUOTE]
The only real way cryptolocker is spread is by email attachments. If you have a decent AV and use some common sense you'll most likely be fine.
[QUOTE='[EG] Pepper;45611915']The only real way cryptolocker is spread is by email attachments. If you have a decent AV and use some common sense you'll most likely be fine.[/QUOTE]
A decent AV won't pickup a zero day virus that doesn't do the usual harm. Common sense is definitely more important in this case
Anyone can brainfart and click the wrong thing so using common sense as your only av is not using common sense
Isn't there a way to get your files back without the ransom? I remember an IT dude on FP made a post somewhere about it sitting in unallocated disk space.
[QUOTE=ZombieWaffle;45612803]Isn't there a way to get your files back without the ransom? I remember an IT dude on FP made a post somewhere about it sitting in unallocated disk space.[/QUOTE]
No, that sounds like utter nonsense. Your files are encrypted and the decrpyption key is stored on a remote server. There's nothing stored locally that will help getting your files back.
[QUOTE=ZombieWaffle;45612803]Isn't there a way to get your files back without the ransom? I remember an IT dude on FP made a post somewhere about it sitting in unallocated disk space.[/QUOTE]
Older versions of cryptlocker had a bunch of holes that allowed for partial recovery of files in many cases.
Newer versions deliberately made absolutely sure to wipe empty segments of the disc clean to prevent stuff like this from being possible.
Sorry, you need to Log In to post a reply to this thread.