It's usually in bitcoin i think.

________________________________
From: Af <[email protected]> on behalf of Josh Luthman 
<[email protected]>
Sent: Friday, September 30, 2016 9:52 AM
To: [email protected]
Subject: Re: [AFMUG] OT: Ransomware

Just a thought...since it's social engineering anyway...

What if you called and asked when the files would be returned to you?  Say you 
paid an hour ago but it still hasn't been fixed.

Maybe give them a credit card that you don't use often and pay the bill with 
that, then when you get your files nuke the machine and dispute the 
charge/cancel the card.


Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

On Fri, Sep 30, 2016 at 10:48 AM, Adam Moffett 
<[email protected]<mailto:[email protected]>> wrote:
The ransomware is still on the computer after you pay the ransom, right?  So 
the only way to stop them from hitting you again when they're hard up for 
cocaine money is to invest a lot in IT fixes anyway.  Same problem, except if 
you pay the ransom maybe you get your data back.  But paying the ransom also 
encourages them to keep doing it to other people, and maybe contributes to the 
ongoing problem.  I guess it comes down to whether you have enough of it backed 
up.


------ Original Message ------
From: "That One Guy /sarcasm" 
<[email protected]<mailto:[email protected]>>
To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>>
Sent: 9/30/2016 9:54:35 AM
Subject: Re: [AFMUG] OT: Ransomware

the ransoms are relatively cheap if youre not a targeted corportation, running 
between 150 and 8The amount of work stoppage and time investment alot of people 
put into this exceeds the ransom anyway

On Fri, Sep 30, 2016 at 8:42 AM, Ken Hohhof 
<[email protected]<mailto:[email protected]>> wrote:
FireEye was providing a decrypt tool for the original Cryptolocker but likely 
you are out of luck.  Find a backup, pay the ransom, or kiss your data goodbye.

From: Af [mailto:[email protected]<mailto:[email protected]>] On Behalf 
Of Jason McKemie
Sent: Friday, September 30, 2016 1:26 AM
To: [email protected]<mailto:[email protected]>
Subject: Re: [AFMUG] OT: Ransomware

Depends on the ransomware.  I found a decryption tool for my mom's computer 
when she managed to get it infected - depends on the particular flavor I'm 
sure.  I think this one had .crypt or .crypted extensions on all the files.  I 
did need an copy of one of the encrypted files prior to the infection for the 
program to do its job though.

On Fri, Sep 30, 2016 at 12:14 AM, Travis Johnson 
<[email protected]<mailto:[email protected]>> wrote:
Hi,

One of our office computers was just infected with "ransomware". It has 
encrypted all the files on that computer, plus many files on a server that 
computer was connected to.

Any ideas or suggestions on the best way to try and fix/remove this crap and 
unencrypt all the files?

Travis




--
If you only see yourself as part of the team but you don't see your team as 
part of yourself you have already failed as part of the team.

Reply via email to