this is the same situation as the ubnt malware fiasco, good practices would
have avoided it being an issue. but the real world doesnt work that way.
and as i understand it its becoming longer between the initial infection
and the date of action to ensure backups are impacted also

you would think that indexing could be capiltalized on at the OS level to
defaultly notify whenever a certain percentage of files are altered,
encrypting a terrabyte drive has to take some time.

On Fri, Sep 30, 2016 at 9:58 AM, Bill Prince <[email protected]> wrote:

> Based on what I've seen, read, and heard; you're screwed. Pay the ransom,
> clean the files off, and reformat the hard drive (or trash it)...
>
>
> bp
> <part15sbs{at}gmail{dot}com>
>
>
> On 9/29/2016 10:14 PM, Travis Johnson wrote:
>
>> Hi,
>>
>> One of our office computers was just infected with "ransomware". It has
>> encrypted all the files on that computer, plus many files on a server that
>> computer was connected to.
>>
>> Any ideas or suggestions on the best way to try and fix/remove this crap
>> and unencrypt all the files?
>>
>> Travis
>>
>>
>


-- 
If you only see yourself as part of the team but you don't see your team as
part of yourself you have already failed as part of the team.

Reply via email to