SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    How to deal with ransomware
Page 1 2 3 
Go
New
Find
Notify
Tools
Reply
  
How to deal with ransomware Login/Join 
Nullus Anxietas
Picture of ensigmatic
posted Hide Post
quote:
Originally posted by ugeesta:
^^^^^. So what is a good backup strategy? We have an external storage device hooked up to our computers for backup. At one time that was enough.

If the backup device is always accessible from the PC: It's vulnerable.

I have a pair of USB drives. One's hooked up to the computer for unattended backups. The other's in the safe. They get swapped monthly.

When they're swapped, a full backup is automatically done. Then, on following days, so-called "differential" backups, backing up only what's changed since the previous day, are done.

I have only two drives. You can do this with as many as you like. And swap them as often as you feel your exposure warrants. (I cannot help you with backup software choices. I rolled my own.)

My backup mechanism I regard to be sufficient because I judge my exposure to be relatively limited. I use RAID storage, I don't run the most exploited O/S on the market or any of the most commonly-exploited software, my network connectivity is nailed-down tightly and I practice Safe Computing™.

Conversely: The average computer user is betting it all on one hard drive; is using the most exploited O/S on the market; runs several of the most commonly-exploited pieces of software on the market; has little, if anything, in the way of a backup procedure; has little, if anything, in the way of Internet border firewalling, and does not practice safe computing.



"America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe
"If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher
 
Posts: 26059 | Location: S.E. Michigan | Registered: January 06, 2008Reply With QuoteReport This Post
Shit don't
mean shit
posted Hide Post
Man, that truly sucks.

Just curious, do you know how you got infected?

Do you login as a privileged user (admin user), or do you have a non-admin account for day-to-day web surfing?

After my wife ran a program that installed a virus several years ago I no longer use the admin account. She's asked me for the PW, but I don't give it to her. She once said she needed it because in order to track a FedEx package she needed to install something. Roll Eyes It dind't get installed.
 
Posts: 5836 | Location: 7400 feet in Conifer CO | Registered: November 14, 2006Reply With QuoteReport This Post
quarter MOA visionary
Picture of smschulz
posted Hide Post
quote:
Originally posted by ugeesta:
^^^^^. So what is a good backup strategy? We have an external storage device hooked up to our computers for backup. At one time that was enough.


Like I mentioned before and ensigmatic illuminated > the only thing is to "air gap" your back up, take them offine so that they cannot be attacked when the event hits.
There are other variations of this but the easiest (if you are disciplined enough to do it) method.
Additionally, online backup copies, encrypted backups, back up to NAS with snap shots, using specific backup credentials all can have some degree of effectiveness.
 
Posts: 23453 | Location: Houston, TX | Registered: June 11, 2006Reply With QuoteReport This Post
Member
posted Hide Post
I use an older Synology DS213 RAID system for backup. When my backup software alerts that it's time to perform a full or incremental backup, I turn the DS213 on, perform the backup, and then immediately turn it off. Doesn't protect against fire or flood, but just about everything else.
 
Posts: 1248 | Location: NE Indiana  | Registered: January 20, 2011Reply With QuoteReport This Post
Little ray
of sunshine
Picture of jhe888
posted Hide Post
quote:
Originally posted by creslin:
Personally if I came home and found my computer in that state.. I'd simply wipe and reload the OS.
Any files that I'm concerned about keeping I have staged on multiple machines and/or in the cloud.

It would merely be an annoyance of a couple hours while i re-install.


Yes. I don't know how hard or difficult it would be to un-encrypt the data if it is too late for that. I suspect it would be hard. Encryption is robust and easy.




The fish is mute, expressionless. The fish doesn't think because the fish knows everything.
 
Posts: 53446 | Location: Texas | Registered: February 10, 2004Reply With QuoteReport This Post
Little ray
of sunshine
Picture of jhe888
posted Hide Post
quote:
Originally posted by ScreamingCockatoo:
We just hired a consulting company out of California to help us at my place of work.
It was about $45,000 in the criminal currency BitCoin.


Criminals may use Bitcoin, but criminals also use guns and autos. That doesn't make guns and autos "criminal." It isn't the thing, it is the criminal.




The fish is mute, expressionless. The fish doesn't think because the fish knows everything.
 
Posts: 53446 | Location: Texas | Registered: February 10, 2004Reply With QuoteReport This Post
McNoob
Picture of xantom
posted Hide Post
quote:
Unfortunately, many of my clients do not share the same fear.

Yep, my experience is that no one cares until they are faced with major data loss.

Just to add to what others have said. I do images every 6 months, or as needed, and data backups on average every 3 days. I store that on a NAS box, with other collective data. I make copies of that data over multiple computers. I then backup to large external hard drives. One in my fire safe and one in a safety deposit box, swapping as needed. Nothing of importance in the "cloud" for me.




"We've done four already, but now we're steady..."
 
Posts: 1880 | Location: MN | Registered: November 20, 2013Reply With QuoteReport This Post
I'd rather have luck
than skill any day
Picture of mjlennon
posted Hide Post
quote:
Originally posted by snidera:
longshot, but one friend got this shit & all I had to do was change the file extension back to .jpeg/.mp3/etc to fix the file(s). It wasn't really encrypted, just the extension was changed. 90% of people wouldn't know the difference.

this was quite a while ago, before this shit was popular - but it's at least worth a shot.


I tried this, unfortunately it did not work.
 
Posts: 1862 | Location: Fayetteville, Georgia | Registered: December 08, 2005Reply With QuoteReport This Post
Member
posted Hide Post
quote:
Originally posted by jhe888:
quote:
Originally posted by ScreamingCockatoo:
We just hired a consulting company out of California to help us at my place of work.
It was about $45,000 in the criminal currency BitCoin.


Criminals may use Bitcoin, but criminals also use guns and autos. That doesn't make guns and autos "criminal." It isn't the thing, it is the criminal.


+1
 
Posts: 958 | Registered: October 07, 2013Reply With QuoteReport This Post
Member
posted Hide Post
Some of the next generation AV applications can protect you from ransomware. Look for programs that don't use virus definitions but are behavior based using machine learning or artificial intelligence. Cylance and SentinalOne are both next gen AV applications and there are many others. I set up Cylance at work and have been very impressed with the results.
 
Posts: 6 | Registered: May 27, 2015Reply With QuoteReport This Post
eh-TEE-oh-clez
Picture of Aeteocles
posted Hide Post
quote:
Originally posted by ugeesta:
^^^^^. So what is a good backup strategy? We have an external storage device hooked up to our computers for backup. At one time that was enough.


I don't think this strategy has ever been good enough. What happens if your house were to catch fire? Gone goes your computer, and the external storage device attached to it. Now what?

A good backpack strategy is to follow the 3-2-1 rule. At least: 3 copies, in 2 different formats, 1 stored off site. My application of the 3-2-1 rule looks a little like this:

Copy 1 - Format 1 - Location 1: Computer OS Drive and Data Drive

Copy 2 - Format 2 - Location 1: Acronis True Image backup onto a Network Attached Storage (NAS) Drive. Format 2 because these files are not an exact copy of their originals, but instead are in a special Acronis backup container/format. Also Format 2 because these are on a different media (magnetic platter vs SSD).

*Bonus Copy 2 - Format 2 - Location 1: The NAS, above, has a redundant drive that is a mirror of the first.

Copy 3 - Format 1 - Location 2: Cloud backup to Google's Backup-And-Sync of Photos, Videos, and Documents. Location 2 because it is offsite. If my house catches fire, this copy is safe. Or if the Google server farm gets bombed, my local copy is safe.

Copy 4 - Format 1 - Location 1: Occasional, manual backe up of Photos, Videos, and Documents to an External USB Drive.


In this setup, even if the Ransomeware gets past my Anti-Virus and Acronis' Active Protection, and encrypted files from my computer get migrated/synced up to the cloud, Google will hypothetically have old/previous versions of my files saved. I should be able to just restore the old versions.

Of course, you can't really completely depend on file versioning as your saving grace. Luckily, part of my workflow is that I need my pictures, videos, and files to work on both my desktop and laptop--so incidentally, I have an external USB drive that is synched with my desktop whenever I come home with a new batch of photos or whenever I take my laptop with me on my travels. This serves as my last ditch backup, as these files aren't guaranteed to be 100% up to date at any given time, but will have 99% of everything I might lose to a Ransomware attack. This is the "air gap" that the previous posters were referring to.
 
Posts: 13068 | Location: Orange County, California | Registered: May 19, 2002Reply With QuoteReport This Post
Member
posted Hide Post
Other than try to give you a future backup strategy I will give you this. Back your hard drive now. As others have mentioned air gap the backup drive when complete. There is a chance there will be a decrypting tool in the future. Once you have your encrypted photos backed up, do a fresh OS install, and get all security updates for whatever OS you're running. That nasty shit is still lingering on your current system.

Keep Googling payday@cryptmaster.info. Something will come up sooner or later.

Your choice if you want to pay or not. I wouldn't.

Good luck. My wife LOST her iPhone with about 40gb of recent family photos on it. No backup. They're gone. I feel your pain.
 
Posts: 7793 | Registered: October 31, 2008Reply With QuoteReport This Post
I'd rather have luck
than skill any day
Picture of mjlennon
posted Hide Post
I've had a little time to assess the damage. It's bad, there's no debating that. Surprisingly Windows is little effected. However, everything data wise short of audio and video files are hopelessly encrypted. Not sure why they were spared...I have backup of pictures locally and in cloud, so hopefully between the two I'll salvage most of them.

Several people called it an "air gap." That's what I lacked. If you ain't figured it out yet, it means your backup device cannot be connected to the computer; otherwise it may become as infected as the host machine.

Currently I'm retrieving those audio and video files to an external drive. I'll reinstall Windows 10 Pro tomorrow. I doubt it's possible to reuse licenses for programs such as Adobe Acrobat, Acronis True Image and MS Office. I may simply have to repurchase.

I considered Linux, even downloaded the latest Ubuntu version. Nah...I'm too old for this shit. Thanks all for the condolences and words of wisdom. It may take me a day or two to get back...
 
Posts: 1862 | Location: Fayetteville, Georgia | Registered: December 08, 2005Reply With QuoteReport This Post
Baroque Bloke
Picture of Pipe Smoker
posted Hide Post
quote:
Originally posted by mjlennon:
<snip>
I considered Linux, even downloaded the latest Ubuntu version. Nah...I'm too old for this shit. Thanks all for the condolences and words of wisdom. It may take me a day or two to get back...

You might consider FreeBSD, the unix-like OS that powers all Apple OS X machines. I've used OS X for 16+ years with no antivirus software and have never been infected. For the past year I have used Malwarebytes, to scan for malware once a day (takes about 20 seconds). It's never reported any malware.



Serious about crackers
 
Posts: 9727 | Location: San Diego | Registered: July 26, 2014Reply With QuoteReport This Post
I believe in the
principle of
Due Process
Picture of JALLEN
posted Hide Post
quote:
Originally posted by mjlennon:
I've had a little time to assess the damage. It's bad, there's no debating that. Surprisingly Windows is little effected. However, everything data wise short of audio and video files are hopelessly encrypted. Not sure why they were spared...I have backup of pictures locally and in cloud, so hopefully between the two I'll salvage most of them.

Several people called it an "air gap." That's what I lacked. If you ain't figured it out yet, it means your backup device cannot be connected to the computer; otherwise it may become as infected as the host machine.

Currently I'm retrieving those audio and video files to an external drive. I'll reinstall Windows 10 Pro tomorrow. I doubt it's possible to reuse licenses for programs such as Adobe Acrobat, Acronis True Image and MS Office. I may simply have to repurchase.

I considered Linux, even downloaded the latest Ubuntu version. Nah...I'm too old for this shit. Thanks all for the condolences and words of wisdom. It may take me a day or two to get back...


I’m scarcely an experienced user, but my brief foray into Linux has shown me that whatever it may have been in the past, it is now housebroken. There will be some adjusting, learning, etc but nothing so mysterious as to be daunting or intimidating, certainly no more so than transitioning from XP to W10 for example.

The one caveat is that there are programs (apps) that are unique to Windows, and there are ways to handle many of those.




Luckily, I have enough willpower to control the driving ambition that rages within me.

When you had the votes, we did things your way. Now, we have the votes and you will be doing things our way. This lesson in political reality from Lyndon B. Johnson

"Some things are apparent. Where government moves in, community retreats, civil society disintegrates and our ability to control our own destiny atrophies. The result is: families under siege; war in the streets; unapologetic expropriation of property; the precipitous decline of the rule of law; the rapid rise of corruption; the loss of civility and the triumph of deceit. The result is a debased, debauched culture which finds moral depravity entertaining and virtue contemptible." - Justice Janice Rogers Brown
 
Posts: 48369 | Location: Texas hill country | Registered: July 04, 2005Reply With QuoteReport This Post
Knows too little
about too much
Picture of rduckwor
posted Hide Post
quote:
For the past year I have used Malwarebytes, to scan for malware once a day (takes about 20 seconds). It's never reported any malware.



I have never seen MalwareBytes report anything either. How in hell do you get it to scan in 20 seconds? Mine takes at least a hour.

RMD




TL Davis: “The Second Amendment is special, not because it protects guns, but because its violation signals a government with the intention to oppress its people…”
Remember: After the first one, the rest are free.
 
Posts: 20434 | Location: L.A. - Lower Alabama | Registered: April 06, 2008Reply With QuoteReport This Post
Nullus Anxietas
Picture of ensigmatic
posted Hide Post
quote:
Originally posted by JALLEN:
I’m scarcely an experienced user, but my brief foray into Linux has shown me that whatever it may have been in the past, it is now housebroken.

Indeed.

I'm an IT guy. Have been since the days of Apple ][s, Commodore 64s, Exidy Sorcerers and Osborne lug-ables.

I've installed, maintained, administered, recovered, what-have-you, all manner of MS-Win, Linuxen, Unixen, Mac OS, Amiga OS, CP/M and some stuff most here probably never heard of. (Some even I've forgotten.)

Modern desktop Linux' are pretty well tamed. So well-tamed, in fact, that I and my colleagues at work spent considerably less time and effort installing and configuring typical Linux flavours than we did any version of MS-Windows.

quote:
Originally posted by JALLEN:
There will be some adjusting, learning, etc but nothing so mysterious as to be daunting or intimidating, certainly no more so than transitioning from XP to W10 for example.

Yup.

quote:
Originally posted by JALLEN:
The one caveat is that there are programs (apps) that are unique to Windows, and there are ways to handle many of those.

That's the downside. Some stuff is simply not available in any form. And other stuff may suffice for many (I get along fine with The Gimp for image editing/creation, for example), but won't be quite as good as commercial versions on MS-Windows.

Or Mac OS X. That's another alternative. More spendy, for less storage and compute power, but peace of mind. It's not invulnerable (neither is Linux, btw), but your exposure is significantly reduced.

I'm going to get an from my friend smschulz for this, and perhaps rightfully so, but I do not trust any MS-Win box to anything vital or sensitive. And have not for close to a decade. It has been shown to my personal satisfaction they are too quickly, easily and quietly compromised. It has also been demonstrated to my satisfaction that anti-virus/-malware software is mostly ineffective.



"America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe
"If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher
 
Posts: 26059 | Location: S.E. Michigan | Registered: January 06, 2008Reply With QuoteReport This Post
Member
Picture of Dead_Eye
posted Hide Post
How do these people encrypt the data on the machine without any process or notification? Can they encrypt data that has already been encrypted?

Just curious because I'm not really familiar with how someone can break through firewalls, gain access to the computer and encrypt it without something picking up on it.

All my computers are factory installs with all the updates and anything worth keeping are on encrypted SDcards or external HDs that are backed up weekly using a leapfrog method. Nothing is on the cloud.


__________________________________________________________________

Beware the man who has one gun because he probably knows how to use it.
 
Posts: 368 | Location: Somplace with cold drinks and warm women | Registered: May 04, 2016Reply With QuoteReport This Post
Nullus Anxietas
Picture of ensigmatic
posted Hide Post
quote:
Originally posted by Dead_Eye:
How do these people encrypt the data on the machine without any process or notification?

Background process. Maybe even running with Administrator rights. Or wait until nobody's looking.

quote:
Originally posted by Dead_Eye:
Can they encrypt data that has already been encrypted?

Yes.

quote:
Originally posted by Dead_Eye:
Just curious because I'm not really familiar with how someone can break through firewalls, gain access to the computer and encrypt it without something picking up on it.

In most cases it's somebody opening a web page, image, email, some document they shouldn't.

E.g.: I used to fairly regularly note here that Adobe Flash was Yet Again Shown To Be Severely Compromised. Yet, again and again, I see members post, yup, Flash videos. Or comment on Flash videos.

I gave up on trying to convince people that, of all the risky things they could do, having Adobe Flash on their computers was at about the top of the list.

A lot of compromised content, when the user activates it, shows no sign whatsoever that it's been launched. Then it sits there waiting for the computer to go quiet, then gets to work.

One of the worst things MS-Win users can do is lower or defeat UAC (User Account Control). Yet no matter how many times, and how LOUDLY that advice has been given: People still do it, because they find the "Do you want to allow this system change" type warnings "annoying." Well, take that away and you might almost as well be running MS-Win XP, which had no such protection--which was its, and prior versions of MS-Win's, most significant weakness.

Or, worse, they run their computers with the Administrator login.



"America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe
"If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher
 
Posts: 26059 | Location: S.E. Michigan | Registered: January 06, 2008Reply With QuoteReport This Post
eh-TEE-oh-clez
Picture of Aeteocles
posted Hide Post
quote:
Originally posted by Dead_Eye:
How do these people encrypt the data on the machine without any process or notification? Can they encrypt data that has already been encrypted?

Just curious because I'm not really familiar with how someone can break through firewalls, gain access to the computer and encrypt it without something picking up on it.

All my computers are factory installs with all the updates and anything worth keeping are on encrypted SDcards or external HDs that are backed up weekly using a leapfrog method. Nothing is on the cloud.


Firewalls block outside attacks through your network. Ransomware is typically a malicious program that gets downloaded and run on your machine, usually by accident. The software then runs in the background, encrypting things while you use your computer. Often, it will start by changing the names/file extensions of certain types of files, as this can be done in a moment, and further encryption comes along after the fact as the user tries to trouble shoot what he doesn't realize as a ransomware attack.

If you ever downloaded a file from someone, double clicked to open it, and your computer did nothing, you probably downloaded some sort of virus. You double clicking the file probably just ran the executable.
 
Posts: 13068 | Location: Orange County, California | Registered: May 19, 2002Reply With QuoteReport This Post
  Powered by Social Strata Page 1 2 3  
 

SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    How to deal with ransomware

© SIGforum 2024