Alan - I agree - nabbing someone for Speeding is Way more straightforward than 
Nabbing the Scum that run these Ransomware scams!

Thanks for that info below - Very interesting - and am glad to see high level 
org's like FBI and Interpol are involved with tracking down these Ransomware 
Scumbags!

Its really VERY Sad state of affairs - that techies who do this devious type of 
coding aren't instead involved in using their talents for Good - like code to 
analyze problems like Cancer and such...

-K-

-----Original Message-----
From: ProfoxTech [mailto:[email protected]] On Behalf Of Alan Bourke
Sent: Friday, October 16, 2015 4:30 AM
To: [email protected]
Subject: Re: Another new ransomware

On Fri, 16 Oct 2015, at 02:22 AM, Geoff Flight wrote:
> Speed on a safe road and they will chase you to the ends of the earth.

You speeding on a safe road in your town is a cut and dried case for your local 
police. Your PC getting infected by a botnet of compromised machines spread 
across who knows how many countries, and which demands payment in untraceable 
Bitcoin to persons unknown in jurisdictions unknown is a slightly more 
difficult proposition for law enforcement. 

In the case of the original Cryptolocker:

"On 2 June 2014, the United States Department of Justice officially announced 
that over the previous weekend, Operation Tovar—a consortium constituting a 
group of law enforcement agencies (including the FBI and Interpol), security 
software vendors, and several universities, had disrupted the Gameover ZeuS 
botnet which had been used to distribute CryptoLocker and other malware. The 
Department of Justice also publicly issued an indictment against the Russian 
hacker Evgeniy Bogachev for his alleged involvement in the botnet.[4][12][13]

As part of the operation, the Dutch security firm Fox-IT was able to procure 
the database of private keys used by CryptoLocker; in August 2014, Fox-IT and 
fellow firm FireEye introduced an online service which allows infected users to 
retrieve their private key by uploading a sample file, and then receive a 
decryption tool."

--
  Alan Bourke
  alanpbourke (at) fastmail (dot) fm

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/1444984188.2726497.411821273.322b0...@webmail.messagingengine.com
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.
Report [OT] Abuse: 
http://leafe.com/reportAbuse/1444984188.2726497.411821273.322b0...@webmail.messagingengine.com
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/80838f1ca795b14ea1af48659f35166f24b...@drexch02.corp.globetax.com
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to