don't give a crap... unless you try and
hack THEM!
-Original Message-
From: ProFox [mailto:profox-boun...@leafe.com] On Behalf Of Ricardo Aráoz
Sent: Saturday, 12 October 2013 1:14 AM
To: ProFox Email List
Subject: Re: Interesting scam
El 11/10/13 11:35, Alan Bourke escribió:
On Fri, Oct 11
If there is one thing that bugs me it is the prevalence of such things and
the apparent complete lack of effort by any enforcement agency anywhere to
do something about it.
They don't do anything about spam emails either, even though they are
clearly illegal, and very large corporations are
Here's how it works in terms of keys and the like.
http://blog.malwarebytes.org/intelligence/2013/10/cryptolocker-ransomware-what-you-need-to-know/
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance:
...a computer came into our shop recently with this virus. The
countdown timer is controlled by the bios clock. Changing the bios clock
back a few days resets the timer til the private key is destroyed.
Doh?
btw if GCHQ/NSA know when I change my socks how come they don't know
where the ransom
They know the day each year?
Al
-Original Message-
btw if GCHQ/NSA know when I change my socks how come they don't know where
the ransom money is going?
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance:
El 11/10/13 05:01, Alan Bourke escribió:
Here's how it works in terms of keys and the like.
http://blog.malwarebytes.org/intelligence/2013/10/cryptolocker-ransomware-what-you-need-to-know/
From this site you mention:
Free users will still be able to detect the malware if present on a
PC,
On Fri, Oct 11, 2013, at 03:03 PM, Ricardo Aráoz wrote:
From this site you mention:
Free users will still be able to detect the malware if present on a
PC, but will need to upgrade to Pro in order to access these additional
protection options.
So MicroShit wants it's share too.
No,
El 11/10/13 11:35, Alan Bourke escribió:
On Fri, Oct 11, 2013, at 03:03 PM, Ricardo Aráoz wrote:
From this site you mention:
Free users will still be able to detect the malware if present on a
PC, but will need to upgrade to Pro in order to access these additional
protection options.
So
On Wed, Oct 9, 2013, at 11:52 PM, Gene Wirchenko wrote:
So they give us more attention than Microsoft does?
Zing!
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free
How would you be sure that they would give you back the original files
after you paid the ransom?
What if their encryption algorithm was irreversible?
They could just lie to you! :)
On Wed, Oct 9, 2013 at 10:25 PM, Alan Bourke alanpbou...@fastmail.fm wrote:
Just had a customer have every DBF on
How would you be sure that they would give you back the original files
after you paid the ransom?
They wouldn't. They don't. They just steal your money. And if you use your
credit card, then they steal that information. And lots of panicked people
fall for it.
Ken Dibble
www.stic-cil.org
On Thu, Oct 10, 2013, at 02:32 PM, Man-wai Chang wrote:
How would you be sure that they would give you back the original files
after you paid the ransom?
Apparently, at least for CryptoLocker, they *did* release the encryption
key if you paid up, at least initially. This is in their interest,
On Thu, Oct 10, 2013 at 8:55 AM, Alan Bourke alanpbou...@fastmail.fmwrote:
On Thu, Oct 10, 2013, at 02:32 PM, Man-wai Chang wrote:
How would you be sure that they would give you back the original files
after you paid the ransom?
Apparently, at least for CryptoLocker, they *did* release
I am now looking at using Software Restriction Policies to block
executables from running except from standard locations.
Setting a path rule to block execution in the Application Data folder, as
follows:
Path: %AppData%\*.exe
Security Level: Disallowed
works in Win XP. However, it does NOT
How come they can't be traced? And have their goolies removed painfully.
Al
-Original Message-
How would you be sure that they would give you back the original files
after you paid the ransom?
They wouldn't. They don't. They just steal your money. And if you use your
credit card, then
On Thu, Oct 10, 2013, at 03:10 PM, Stephen Russell wrote:
How many keys do they need to produce? A new one per day?
One per compromised PC I think.
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance:
On Thu, Oct 10, 2013, at 04:13 PM, Allen wrote:
How come they can't be traced? And have their goolies removed painfully.
I'd imagine they could, given time and effort and willing.
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance:
Well it is a fraud. Which is capable of making millions. I would have though
one authority would have taken it up. Maybe countries need to cooperate. Lol
that will happen.
Al
-Original Message-
On Thu, Oct 10, 2013, at 04:13 PM, Allen wrote:
How come they can't be traced? And have their
On Thu, Oct 10, 2013 at 10:18 AM, Alan Bourke alanpbou...@fastmail.fmwrote:
On Thu, Oct 10, 2013, at 03:10 PM, Stephen Russell wrote:
How many keys do they need to produce? A new one per day?
One per compromised PC I think.
___
Today
Just had a customer have every DBF on their system encrypted by this. It
targets all MS Office and general business file extensions, of which DBF
is one.
On Tue, Oct 8, 2013, at 09:37 AM, Paul Hill wrote:
Hi All,
2 of our customers (unrelated, and in different countries) just got
infected
And it will encrypt them across network connections, too.
On Wed, Oct 9, 2013, at 03:25 PM, Alan Bourke wrote:
Just had a customer have every DBF on their system encrypted by this. It
targets all MS Office and general business file extensions, of which DBF
is one.
On Tue, Oct 8, 2013, at
So many SCUMBAGS Out there in the World - with nothing better to do than
find MORE Ways to Rip Off Other people!!! Some Humans REALLY SUCK!
-K-
On 10/9/2013 10:25 AM, Alan Bourke wrote:
Just had a customer have every DBF on their system encrypted by this. It
targets all MS Office and general
Is this just a UK thing so far?
I have notified out Ops mgr bout it because we have a plant in Swanley .
On Wed, Oct 9, 2013 at 9:25 AM, Alan Bourke alanpbou...@fastmail.fm wrote:
Just had a customer have every DBF on their system encrypted by this. It
targets all MS Office and general
On Wed, Oct 9, 2013, at 03:48 PM, Stephen Russell wrote:
Is this just a UK thing so far?
Well, I'm in Ireland, so UK and Ireland ... no I would think it is
worldwide.
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance:
Sent: 09 October 2013 15:52
To: profoxt...@leafe.com
Subject: Re: Interesting scam
On Wed, Oct 9, 2013, at 03:48 PM, Stephen Russell wrote:
Is this just a UK thing so far?
Well, I'm in Ireland, so UK and Ireland ... no I would think it is worldwide.
[excessive quoting removed by server
On Wed, Oct 9, 2013 at 9:52 AM, Alan Bourke alanpbou...@fastmail.fm wrote:
On Wed, Oct 9, 2013, at 03:48 PM, Stephen Russell wrote:
Is this just a UK thing so far?
Well, I'm in Ireland, so UK and Ireland ... no I would think it is
worldwide.
-
Sorry about the UK reference
On Wed, Oct 9, 2013, at 04:33 PM, Stephen Russell wrote:
Sorry about the UK reference ;-
Why, no apology necessary - it's only like accusing you of being from
Georgia or something :)
___
Post Messages to: ProFox@leafe.com
Subscription Maintenance:
Is this just a UK thing so far?
Not at all. And it's been around for at least a couple of years, though
there are variants that put up the same ransom demands and lock the user
out of the computer for all intents and purposes without actually
encrypting any files.
Ken Dibble
On Wed, Oct 9, 2013 at 11:52 AM, Ken Dibble krdib...@stny.rr.com wrote:
Is this just a UK thing so far?
Not at all. And it's been around for at least a couple of years, though
there are variants that put up the same ransom demands and lock the user
out of the computer for all intents and
At 07:25 2013-10-09, Alan Bourke alanpbou...@fastmail.fm wrote:
Just had a customer have every DBF on their system encrypted by this. It
targets all MS Office and general business file extensions, of which DBF
is one.
So they give us more attention than Microsoft does?
[snip]
Sincerely,
Hi All,
2 of our customers (unrelated, and in different countries) just got
infected with some 'ransomware' that ate a bunch of dbf files. It is
demanding 300 USD / 300 EUR to unencrypt and release these files.
Here is a similar screenshot:
31 matches
Mail list logo