Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
bobua
Mar 23, 2003
I'd trade it all for just a little more.

Walter_Sobchak posted:

I've had someone get hit by 2 variants of the "FBI found kiddie porn!" virus in one week. As it's the same person, I'm inclined to think that there was something I didn't get the first go round that let the PC get reinfected. Besides MBAM and ComboFix, what else am I forgetting to do here?

Sometimes it's just too new and you aren't going to get the whole thing.

Other times you miss that it added a legitimate windows task to the windows\tasks folder and that's just old school sneaky:(

Adbot
ADBOT LOVES YOU

Proud Christian Mom
Dec 20, 2006
READING COMPREHENSION IS HARD
Tools are the just first stage of cleaning and giving you an idea of what you're up against. If you aren't searching for the rest of it yourself then welp

Khablam
Mar 29, 2012

Walter_Sobchak posted:

I've had someone get hit by 2 variants of the "FBI found kiddie porn!" virus in one week. As it's the same person, I'm inclined to think that there was something I didn't get the first go round that let the PC get reinfected. Besides MBAM and ComboFix, what else am I forgetting to do here?

It's also somewhat likely he's just visited the same site which has done a drive-by for the second time.
You probably want to look at how you manage java on the machines.

Dice Dice Baby
Aug 30, 2004
I like "faggots"

Khablam posted:

It's also somewhat likely he's just visited the same site which has done a drive-by for the second time.
You probably want to look at how you manage java on the machines.

Basic protocol I have is asking: Do you need java?

No? Then don't install it

Yes? Install it but always keep it up to date, you a/v definitions up to date and anything else you might have that can prevent or block malware, like other software, firewall or NAT, etc.

BOOTY-ADE
Aug 30, 2006

BIG KOOL TELLIN' Y'ALL TO KEEP IT TIGHT

Dice Dice Baby posted:

Basic protocol I have is asking: Do you need java?

No? Then don't install it

Yes? Install it but always keep it up to date, you a/v definitions up to date and anything else you might have that can prevent or block malware, like other software, firewall or NAT, etc.

The only problem I've seen with Java at a lot of places is that developers aren't keeping their applications or programs up to date, so they end up using some old, outdated, more vulnerable version of Java rather than being compatible with the newest. Two of my last employers had that issue where they required specific versions of Java in order for certain apps to work, and if you loaded anything other than those versions, it broke the app and caused all sorts of problems. :(

And the antivirus stuff is great, but there are a few that completely suck rear end and don't get new updates often enough, some not until after the fact. Forefront Endpoint Protection and pretty much anything Symantec or McAfee all suck rear end, I can't count how many times they've showed "up to date" and some virus/malware that's been known about for weeks or months ends up sneaking through and has to be killed by a third party app like Malwarebytes. Not to mention some of these AV suites are serious resource hogs and slow the system nearly to a halt just running a goddamn virus scan.

Dice Dice Baby
Aug 30, 2004
I like "faggots"

Ozz81 posted:

The only problem I've seen with Java at a lot of places is that developers aren't keeping their applications or programs up to date, so they end up using some old, outdated, more vulnerable version of Java rather than being compatible with the newest. Two of my last employers had that issue where they required specific versions of Java in order for certain apps to work, and if you loaded anything other than those versions, it broke the app and caused all sorts of problems. :(

And the antivirus stuff is great, but there are a few that completely suck rear end and don't get new updates often enough, some not until after the fact. Forefront Endpoint Protection and pretty much anything Symantec or McAfee all suck rear end, I can't count how many times they've showed "up to date" and some virus/malware that's been known about for weeks or months ends up sneaking through and has to be killed by a third party app like Malwarebytes. Not to mention some of these AV suites are serious resource hogs and slow the system nearly to a halt just running a goddamn virus scan.

Unfortunately, anti-virus software with heuristics will have that effect... slowing things down while offering a possible shield against unknown threats :(

A tip I forgot for Java: if you need an older version of java, have the newest version installed AND the old version, but disable the old version in the Control Panel. Make a shortcut by hand to the software that needs the old version of java.

I have appended an example of a shortcut that runs jperf on JRE 5.
Notice the "Start in" entry is the file location of the software I'm running.
The Target location will usually be like
code:
%ProgramFiles(x86)%\Java\jre5\bin\javaw.exe -jar -Xms1024m -Xmx1024m jperf.jar
Though in this case it has to load libraries, so it's atually
code:
%ProgramFiles(x86)%\Java\jre5\bin\javaw.exe
-classpath jperf.jar;lib\forms-1.1.0.jar;lib\jcommon-1.0.10.jar;lib\jfreechart-1.0.6.jar;lib\swingx-0.9.6.jar
net.nlanr.jperf.JPerf
Easiest way to do this is to go to %ProgramFiles(x86)%\Java\jre[version]\bin\, find javaw, right click and Send to Desktop (create shortcut) then edit it to what you need

Only registered members can see post attachments!

Dice Dice Baby fucked around with this message at 05:22 on May 22, 2013

Zogo
Jul 29, 2003

Walter_Sobchak posted:

I've had someone get hit by 2 variants of the "FBI found kiddie porn!" virus in one week. As it's the same person, I'm inclined to think that there was something I didn't get the first go round that let the PC get reinfected. Besides MBAM and ComboFix, what else am I forgetting to do here?

If you want to be more thorough run rkill and TDSSKiller before MBAM and ComboFix. Windows Defender Offline is a good idea too http://windows.microsoft.com/en-us/windows/what-is-windows-defender-offline

fart simpson
Jul 2, 2005

DEATH TO AMERICA
:xickos:

If you go to my company's IT department asking for help getting our expense report software running, they will actually uninstall any versions of java newer than Java 6 Update 21 from your computer.

Dice Dice Baby
Aug 30, 2004
I like "faggots"

MeramJert posted:

If you go to my company's IT department asking for help getting our expense report software running, they will actually uninstall any versions of java newer than Java 6 Update 21 from your computer.

Now that's just lazy and retarded :(

Hex Darkstar
May 28, 2004

I think I need another liver transplant.
There's a lot of places like that :( One of them that I worked for actually had Java 6 Update 22 in their image and it was the *only* thing they distributed (This was as of like 6-7 months ago too). Apparently it was needed for some legacy web applications and it was far more cost effective to run the risk of utilizing that horribly buggy and vulnerability ridden mess rather than updating their applications.

co199
Oct 28, 2009

I AM A LOUSY FUCKING COMPUTER JANITOR WHO DOES NOT KNOW ANYTHING ABOUT CYBER COMPUTER HACKER SHIT.

PLEASE DO NOT LISTEN TO MY FUCKING AWFUL OPINIONS AS I HAVE NO FUCKING IDEA WHAT I AM TALKING ABOUT.
I wanted to mention that W32.Changeup is indeed a bitch to get rid of, but as far as worms go it's not hugely destructive. The main factors that cause it to be a pain are its network replication abilities, pseudo-"polymorphism" (differing MD5s downloaded from C&C servers) and the other malware it can download (Zeus/Zbot, etc.) I've been dealing with major corporate clients infected with the worm since December of last year, although the worm itself has been in the wild since roughly 2009.

Symantec has a very good writeup here:

http://www.symantec.com/security_response/writeup.jsp?docid=2009-081806-2906-99&tabid=2

and here:

http://www.symantec.com/connect/blog-tags/w32changeup

In almost every instance, the customers' AV implementation was able to remove the infection, but it took anywhere from two-three days to a week to get the network entirely clean due to endpoints coming online without updated virus definitions and the like. It also involved sample submission to the major AV vendors for expedited definition sets.

Stanley Pain
Jun 16, 2001

by Fluffdaddy

Dice Dice Baby posted:

Now that's just lazy and retarded :(

Nope, that's just how huge enterprise works.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.
I've come across a website (non e-commerce site for a shop) that appears to be serving malware (it was blocked by the firewalls at work, and I didn't note the malware name). There's some rather suspicious obfuscated javascript that inserts iframes from a second website (which serves up a clone of a respectable website).

I've send an email to the proprietor of the hijacked website, and used google's report malware page to flag up the dodgy looking url. Is there anywhere else it's worth reporting to?

mindphlux
Jan 8, 2004

by R. Guyovich

Pablo Bluth posted:

I've come across a website (non e-commerce site for a shop) that appears to be serving malware (it was blocked by the firewalls at work, and I didn't note the malware name). There's some rather suspicious obfuscated javascript that inserts iframes from a second website (which serves up a clone of a respectable website).

I've send an email to the proprietor of the hijacked website, and used google's report malware page to flag up the dodgy looking url. Is there anywhere else it's worth reporting to?

you have done your job, good citizen

Avalanche
Feb 2, 2007
What are the recommended ad-blockers and spyware removal programs nowadays?

Zogo
Jul 29, 2003

Avalanche posted:

What are the recommended ad-blockers and spyware removal programs nowadays?

To block ads:
https://adblockplus.org/en/firefox
http://mywot.com/

This thread has a lot more information:
http://forums.somethingawful.com/showthread.php?threadid=3448981

Randler
Jan 3, 2013

ACER ET VEHEMENS BONAVIS
Is it okay to ask a general question about how something works in this thread? Didn't seem to fit into any other thread.

A friend and me ("Hey you spend lots of time on a PC, you can fix my stuff, right?" guys for relatives) were talking about handling infections. He liked trying to clean systems, while I prefered reinstallations. Topic comes to MBR infections and we couldn't agree on whether a new installation of a newer Windows (Vista, 7, 8) on a disc without any partitions would automatically clean up any MBR infections as well. My understanding was that Windows would write a clean MBR on install overwriting everything that was in place before. Google does not seem to find a reliable and clear-cut answer to this either.

Khablam
Mar 29, 2012

FDisk doesn't re-write the MMR on installing Windows to an existing partition or re-partitioning under most conditions. If you want to be safe and the drive is blank, there's really no reason why you wouldn't simply use the 'fdisk /mbr' command to write a new one.
If your MBR is compromised and you want to preserve the current installation, then under newer versions of Windows you can boot into the recovery mode and go troubleshoot > advanced > command prompt then use the 'bootrec.exe /fixmbr' command.

Bokito
Jul 25, 2007
Going Ape
Microsoft has released version 4 of the Enhanced Mitigation Experience Toolkit (EMET)

http://blogs.technet.com/b/security/archive/2013/06/17/now-available-enhanced-mitigation-experience-toolkit-emet-version-4-0.aspx

quote:

EMET is a free mitigation tool designed to help IT Professionals and developers prevent vulnerabilities in software from being successfully exploited. The tool works by protecting applications via the latest security mitigation technologies built into Windows, even in cases where the developer of the application didn’t opt to do this themselves. By doing so, it enables a wide variety of software to be made significantly more resistant to exploitation – even against zero day vulnerabilities and vulnerabilities for which an update has not yet been applied.

Fortuitous Bumble
Jan 5, 2007

Does turning on DEP in Windows 7 actually make things more secure? I remember seeing an article about it a while back and switched the option to on for everything but sometimes it causes old programs to crash with no explanation until I add an exception and I wanted to make sure it actually works properly in Windows to begin with.

Armourking
Dec 16, 2004

Step off!
Step off!


It's an added layer of security for free. I've had it on for everything for a few years, and only two programs have poo poo the bed - CMud and an old version of Unity. You'll know if they'll crash with DEP because they'll do it straight off the bat.

tjl
Aug 6, 2005

Fortuitous Bumble posted:

Does turning on DEP in Windows 7 actually make things more secure? I remember seeing an article about it a while back and switched the option to on for everything but sometimes it causes old programs to crash with no explanation until I add an exception and I wanted to make sure it actually works properly in Windows to begin with.
Yes it is something that should always be enabled when possible. Exploiting buffer overflows due to errors in programming is still a top threat in the wild; DEP provides a semi-effective countermeasure to these types of attacks. Even more so if you have Windows Vista (or newer) due to another built in memory countermeasure: ASLR.

tjl fucked around with this message at 01:07 on Jul 11, 2013

el_caballo
Feb 26, 2001
I got hit with the iehighutil bit coin miner :rolleyes: virus. Even though I don't have java installed (although I did run Chrome in the wilderness without a No Script extension and I had Python installed (??)) and had a really great false sense of security from DEP/Win7-64/MSE/myself. I'm wondering how hard I should nuke my Windows install. Is the old format and reinstall still the only way to go or are these rootkit tools good enough?

Before I deleted it, I ran Malwarebytes on it and it only detected one of the exes. (MSE didn't see poo poo.) Then I deleted the c:\temporary dir it was in and removed the reference to iehighutil from the registry/msconfig.

I read about the miner virus frequently getting placed through ZeroAccess so I ran TDSS Killer in default mode (clean), then Malwarebytes Anti-Rootkit (clean), then ComboFix.

ComboFix found some weird java Standard Widget Toolkit DLLs in the App Data\Temp folder: .cpswt\swt-gdip-win32-4234.dll and swt-win32-4234.dll, a Frapsvid.dll in SysWow64 (legit I'd think) and finally a c:\windows\TEMP\jna6351097746654618341.dll that I think is a legit part of my CrashPlan backup service (same timestamp as a bunch of other java-type files created at the same time as my backup started).

Anyways, I had ComboFix delete all of them. Then I ran TDSS Killer again with all the boxes checked and it was clean again. I ran RogueKiller 64 and it found a few registry entries that I can't judge:

[HJ POL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND


Just for fun, I ran Adwcleaner and it found some registry refs to what just seemed like Ask.com garbage ("APN PIP") that Foxit PDF Reader installed despite me checking no to that toolbar poo poo.

I even ran Universal Virus Sniffer but immediately closed it because it seemed to be above my paygrade. It did only seem to find "suspicious" entries though and I assume that it's maybe a little paranoid?

So does this seem like a ZeroAccess/rootkit thing or just a simple virus? Or does the lack of detection mean it's a newer ZeroAccess variant or some other rootkit?

el_caballo fucked around with this message at 19:58 on Jul 15, 2013

FCKGW
May 21, 2006

Here's a cool new one, specifically targeting Safari on Mac. Takes advantage of a neat feature of Safari to use a bit of social engineering to get someone to download their "system cleaner"

http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/

quote:

FBI Ransomware Now Targeting Apple’s Mac OS X Users

Cyber-criminals, well known for not re-inventing the wheel, have ‘ported’ the latest ransomware to OS X, not by using some complicated exploit but rather leveraging the browser and its ‘restore from crash’ feature.

...

Warnings appearing to be from the FBI tell the victim: “you have been viewing or distributing prohibited Pornographic content.. To unlock your computer and to avoid other legal consequences, you are obligated to pay a release fee of $300.”

A quick look at the address bar shows an interesting URL: fbi.gov.id657546456-3999456674.k8381 . com, the bad guys are clearly trying to fool users.

If you choose to ignore the message (which you should), you cannot get rid of the page:



Repeated attempts to close the page will only lead to frustration as even the “Leave Page” browser trick does not work:



If you “force quit” the application, the same ransomware page will come back the next time to restart Safari because of the “restore from crash” feature which loads backs the last URL visited before the browser was quit unexpectedly. Talk about a vicious circle.

This is how it is done, by using some JavaScript code:



The “infinite loop” (which really isn’t) is made possible by 150 iframes created dynamically by this JavaScript snippet:



...

The bad guys know how to use social engineering to entice victims as, for example, I was lead to this locked page by doing a search for Taylor Swift on Bing images. The victim will feel they may have actually being doing something wrong and got caught and ashamed, will pay the “fine.”


tl;dr: Make 150 iframes on a page pop up a prompt, user aint got time for that so they force quit the app. Safari will reload all the old pages, including iframes if you force quit the app. Either click 150 times or pay $300 if you can't figure out how to ctrl-click to reopen the app next time.

Tapedump
Aug 31, 2007
College Slice
Little bit of thread necromancy, but this was unusual...

I came across a system infected with Sirefef / ZeroAccess that had created a directory in %temp% who's path was:

%temp%\❤≸⋙\Ⱒ☠⍨\‮ﯹ๛\{‬

I'd never seen quite that odd of a naming convention. Random alphanumeric crap, yeah, but never gibberish.

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

I have no idea if this will ever happen since it sounds like a lot of bullshit and rainbows, but apparently the era of antivirus is over:
http://techcrunch.com/2013/09/09/shine-security-is-reinventing-the-antivirus-company-for-the-age-of-zero-day-attacks/

Some choice quotes from the CEO:

quote:

PG: It looks like you’re capturing signatures? Are you finding new attacks on the fly? Do you have false positives?
A: Protection is not based on signatures, it’s based on machine learning and AI. Our protection rate is 96% and traditional antivirus is 50%.

MP: Running an AI engine on the phone burns the CPU, which burns battery life. How much battery life hit are you taking?
A: We’ve changed the laws of physics. (MP incredulous). You can download it and see. We take less than 1 percent battery life…We determine what’s bad or good back in the lab, just the brain is installed on device. It just runs when we have to inspect something

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
I have a bridge to sell you.

AV in the long-term is dead, but that's some pretty tripe stuff there.

Orcs and Ostriches
Aug 26, 2010


The Great Twist

Tapedump posted:

Little bit of thread necromancy, but this was unusual...

I came across a system infected with Sirefef / ZeroAccess that had created a directory in %temp% who's path was:

%temp%\❤≸⋙\Ⱒ☠⍨\‮ﯹ๛\{‬

I'd never seen quite that odd of a naming convention. Random alphanumeric crap, yeah, but never gibberish.

I especially like the skull and crossbones in there. More viruses need to use that.

Khablam
Mar 29, 2012

Scaramouche posted:

I have no idea if this will ever happen since it sounds like a lot of bullshit and rainbows, but apparently the era of antivirus is over:
http://techcrunch.com/2013/09/09/shine-security-is-reinventing-the-antivirus-company-for-the-age-of-zero-day-attacks/

Some choice quotes from the CEO:

It's going to do a just grand job of "self healing" after it lets the machine get a rootkit installed, since it needs to let it install to tell what it is.
It needs to let code do it's thing to know what it does ... and why is letting it do it to the machine better than doing it in a sandbox again? Not to mention it's USP (self healing) is a paid feature of a freemium model, which is pretty much akin to the whole thing being hostageware you pay for.

Also traditional A/V detection rates are up-to 99%, and 25% of appstore purchases don't contain malware, you lying sack of poo poo.

In the Q&A he states the CPU use is so low because it doesn't get analysed on the device but in the cloud, and later states security isn't a concern because it's all done on the device. THEN says they do all the analysis "back in the lab", and THEN says nothing gets transmitted to them. Which is it?

Then of course the kicker - techcrunch is on the payroll of the company they're writing a glowing review of :v:

:cripes:

Khablam fucked around with this message at 19:59 on Sep 12, 2013

tjl
Aug 6, 2005
Interesting antivirus idea. I could see this detection AI working quite well on a honeypot system, which can then be used to generate real-time signatures on the network. I would not trust "self repair" of any sort on a production system based on what this guy said though; that sounds like utter bullshit until proven otherwise. How can their magic AV be immune to system changes itself? To me it would only be a matter of time before the bad guys figure that little trick out.

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!
"We'll protect you from rootkits! Install our rootkit and it will kick all the bad ones out!"

Diva Cupcake
Aug 15, 2005

Khablam posted:

Also traditional A/V detection rates are up-to 99%, and 25% of appstore purchases don't contain malware, you lying sack of poo poo.
99% of known infections maybe. AV used in conjunction with EMET, you're probably doing pretty well.

This product is still horseshit though.

Khablam
Mar 29, 2012

Ozu posted:

99% of known infections maybe. AV used in conjunction with EMET, you're probably doing pretty well.

This product is still horseshit though.

Yeah, true, though heuristics on new samples is still like 90%+ and doesn't work on fairy magic.

reading
Jul 27, 2013
Avira Free Antivirus sure is on my poo poo list since their last major update, that caused it to give those annoying pop-up ads. $34.99 for some online tech support for my free antivirus? Sounds great! Glad that popped up twice today!

Time to move on. It was a good few years, Avira. :sigh:

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.
Anyone encountered Cryptolocker yet? Apparently they make good on their threat to encrypt your files. Have one on my bench that I didn't take seriously and now it looks like I might be forced to pay the ransom.

Info:
http://community.spiceworks.com/topic/381787-crypto-locker-making-the-rounds-beware
http://www.geek.com/apps/disk-encryptiing-cryptolocker-malware-demands-300-to-decrypt-your-files-1570402/

Proud Christian Mom
Dec 20, 2006
READING COMPREHENSION IS HARD

abominable fricke posted:

Anyone encountered Cryptolocker yet? Apparently they make good on their threat to encrypt your files. Have one on my bench that I didn't take seriously and now it looks like I might be forced to pay the ransom.

Info:
http://community.spiceworks.com/topic/381787-crypto-locker-making-the-rounds-beware
http://www.geek.com/apps/disk-encryptiing-cryptolocker-malware-demands-300-to-decrypt-your-files-1570402/

We've discussed it a little in the 'A ticket came in...' thread and I've been following it extensively. Its going to be a real issue. So far payments made have resulted in the files being decrypted. Once time is up the program removes itself and most importantly removes the registry entries containing the public key and list of encrypted files.

Long story short, if you don't have backups/system restore, pay the ransom. I don't think anyone is holding out much hope on the encryption being broken.

Welcome to the future, guys.

abominable fricke
Nov 11, 2003

What does Pottsylvania have more than any other country? Mean! We have more mean than any other country in Europe! We must export mean.

go3 posted:

We've discussed it a little in the 'A ticket came in...' thread and I've been following it extensively. Its going to be a real issue. So far payments made have resulted in the files being decrypted. Once time is up the program removes itself and most importantly removes the registry entries containing the public key and list of encrypted files.

Long story short, if you don't have backups/system restore, pay the ransom. I don't think anyone is holding out much hope on the encryption being broken.

Welcome to the future, guys.

I've read a little bit about it, and I guess my understanding is unclear. Does the software encrypt the data when it is installed? Or, does it encrypt when the timer reaches 0? Another thing that I am wondering about, does it run from a system context or a user context? I ask because I have a machine that sat on my bench (off), while the timer was still running and I booted it after the timer expired (but didn't log in). So I am wondering if I set the clock on the computer to a time shortly after the machine as brought in, can the ransom be paid and the machine restored to backup up the data and then flatten it?

THF13
Sep 26, 2007

Keep an adversary in the dark about what you're capable of, and he has to assume the worst.

abominable fricke posted:

I've read a little bit about it, and I guess my understanding is unclear. Does the software encrypt the data when it is installed? Or, does it encrypt when the timer reaches 0? Another thing that I am wondering about, does it run from a system context or a user context? I ask because I have a machine that sat on my bench (off), while the timer was still running and I booted it after the timer expired (but didn't log in). So I am wondering if I set the clock on the computer to a time shortly after the machine as brought in, can the ransom be paid and the machine restored to backup up the data and then flatten it?

I haven't run into it personally, but I believe the software starts encrypting everything as soon as it gets on the machine, and only pops up the ransomware notice once it's done.

I don't know about the second part of your question, but I wouldn't count on it working.

Khablam
Mar 29, 2012

I was going to suggest using undelete tools to restore as much of the non-encrypted content as possible, but this software goes ahead and securely overwrites what it encrypts. It's actually better at locking down your files than most off-the-shelf encryption software.

I'm morbidly impressed and will likely deliberately infect a virtual machine tonight to see it go :v:

Adbot
ADBOT LOVES YOU

stevewm
May 10, 2005

abominable fricke posted:

I've read a little bit about it, and I guess my understanding is unclear. Does the software encrypt the data when it is installed? Or, does it encrypt when the timer reaches 0? Another thing that I am wondering about, does it run from a system context or a user context?......

It starts silently encrypting the second it gets installed. It does not pop up the ransom notice until after it has finished encrypting. And it runs from the user context out of that users AppData directory.

Putting a software restriction policy in place that prevents app execution in the AppData directory does stop it currently. Such a policy actually stops several forms of spyware from working. It also blocks some legitimate software such as Google Chrome and Dropbox, but those can be fixed by not installing them to the AppData directory.

My company is lucky so far.. We use Google Apps and so far their spam/virus filter seems to be catching it.

  • Locked thread