lol they dont take credit cards, bitcoin only, and as i understand all communication is via email.
On Fri, Sep 30, 2016 at 9:52 AM, Josh Luthman <[email protected]> wrote: > Just a thought...since it's social engineering anyway... > > What if you called and asked when the files would be returned to you? Say > you paid an hour ago but it still hasn't been fixed. > > Maybe give them a credit card that you don't use often and pay the bill > with that, then when you get your files nuke the machine and dispute the > charge/cancel the card. > > > Josh Luthman > Office: 937-552-2340 > Direct: 937-552-2343 > 1100 Wayne St > Suite 1337 > Troy, OH 45373 > > On Fri, Sep 30, 2016 at 10:48 AM, Adam Moffett <[email protected]> > wrote: > >> The ransomware is still on the computer after you pay the ransom, right? >> So the only way to stop them from hitting you again when they're hard up >> for cocaine money is to invest a lot in IT fixes anyway. Same problem, >> except if you pay the ransom maybe you get your data back. But paying the >> ransom also encourages them to keep doing it to other people, and maybe >> contributes to the ongoing problem. I guess it comes down to whether you >> have enough of it backed up. >> >> >> ------ Original Message ------ >> From: "That One Guy /sarcasm" <[email protected]> >> To: "[email protected]" <[email protected]> >> Sent: 9/30/2016 9:54:35 AM >> Subject: Re: [AFMUG] OT: Ransomware >> >> >> the ransoms are relatively cheap if youre not a targeted corportation, >> running between 150 and 8The amount of work stoppage and time investment >> alot of people put into this exceeds the ransom anyway >> >> On Fri, Sep 30, 2016 at 8:42 AM, Ken Hohhof <[email protected]> wrote: >> >>> FireEye was providing a decrypt tool for the original Cryptolocker but >>> likely you are out of luck. Find a backup, pay the ransom, or kiss your >>> data goodbye. >>> >>> >>> >>> *From:* Af [mailto:[email protected]] *On Behalf Of *Jason McKemie >>> *Sent:* Friday, September 30, 2016 1:26 AM >>> *To:* [email protected] >>> *Subject:* Re: [AFMUG] OT: Ransomware >>> >>> >>> >>> Depends on the ransomware. I found a decryption tool for my mom's >>> computer when she managed to get it infected - depends on the particular >>> flavor I'm sure. I think this one had .crypt or .crypted extensions on all >>> the files. I did need an copy of one of the encrypted files prior to the >>> infection for the program to do its job though. >>> >>> >>> >>> On Fri, Sep 30, 2016 at 12:14 AM, Travis Johnson <[email protected]> wrote: >>> >>> Hi, >>> >>> One of our office computers was just infected with "ransomware". It has >>> encrypted all the files on that computer, plus many files on a server that >>> computer was connected to. >>> >>> Any ideas or suggestions on the best way to try and fix/remove this crap >>> and unencrypt all the files? >>> >>> Travis >>> >>> >>> >> >> >> >> -- >> If you only see yourself as part of the team but you don't see your team >> as part of yourself you have already failed as part of the team. >> >> > -- If you only see yourself as part of the team but you don't see your team as part of yourself you have already failed as part of the team.
