Mining a bitcoin probably costs more in electricity for you than the bitcoin is worth. Either way, you're spending the money...

Jesse DuPont

Network Architect
email: jesse.dup...@celeritycorp.net
Celerity Networks LLC

Celerity Broadband LLC
Like us! facebook.com/celeritynetworksllc

Like us! facebook.com/celeritybroadband

On 9/30/16 8:58 AM, Nate Burke wrote:
But you can just Mine your own bitcoin, can't you?  So it's effectively free ransom.

On 9/30/2016 9:56 AM, That One Guy /sarcasm wrote:
lol they dont take credit cards, bitcoin only, and as i understand all communication is via email.


On Fri, Sep 30, 2016 at 9:52 AM, Josh Luthman <j...@imaginenetworksllc.com> wrote:
Just a thought...since it's social engineering anyway...

What if you called and asked when the files would be returned to you?  Say you paid an hour ago but it still hasn't been fixed.

Maybe give them a credit card that you don't use often and pay the bill with that, then when you get your files nuke the machine and dispute the charge/cancel the card.


Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

On Fri, Sep 30, 2016 at 10:48 AM, Adam Moffett <dmmoff...@gmail.com> wrote:
The ransomware is still on the computer after you pay the ransom, right?  So the only way to stop them from hitting you again when they're hard up for cocaine money is to invest a lot in IT fixes anyway.  Same problem, except if you pay the ransom maybe you get your data back.  But paying the ransom also encourages them to keep doing it to other people, and maybe contributes to the ongoing problem.  I guess it comes down to whether you have enough of it backed up.
 
 
------ Original Message ------
From: "That One Guy /sarcasm" <thatoneguyst...@gmail.com>
Sent: 9/30/2016 9:54:35 AM
Subject: Re: [AFMUG] OT: Ransomware
 
the ransoms are relatively cheap if youre not a targeted corportation, running between 150 and 8The amount of work stoppage and time investment alot of people put into this exceeds the ransom anyway

On Fri, Sep 30, 2016 at 8:42 AM, Ken Hohhof <af...@kwisp.com> wrote:

FireEye was providing a decrypt tool for the original Cryptolocker but likely you are out of luck.  Find a backup, pay the ransom, or kiss your data goodbye.

 

From: Af [mailto:af-boun...@afmug.com] On Behalf Of Jason McKemie
Sent: Friday, September 30, 2016 1:26 AM
To: af@afmug.com
Subject: Re: [AFMUG] OT: Ransomware

 

Depends on the ransomware.  I found a decryption tool for my mom's computer when she managed to get it infected - depends on the particular flavor I'm sure.  I think this one had .crypt or .crypted extensions on all the files.  I did need an copy of one of the encrypted files prior to the infection for the program to do its job though.

 

On Fri, Sep 30, 2016 at 12:14 AM, Travis Johnson <t...@ida.net> wrote:

Hi,

One of our office computers was just infected with "ransomware". It has encrypted all the files on that computer, plus many files on a server that computer was connected to.

Any ideas or suggestions on the best way to try and fix/remove this crap and unencrypt all the files?

Travis

 




--
If you only see yourself as part of the team but you don't see your team as part of yourself you have already failed as part of the team.




--
If you only see yourself as part of the team but you don't see your team as part of yourself you have already failed as part of the team.


Reply via email to