Latest topics
VIRUS WARNING!! This is a REAL VIRUS --- Please Read
5 posters
Page 1 of 1
VIRUS WARNING!! This is a REAL VIRUS --- Please Read
CryptoLocker Virus: New Malware Holds Computers For Ransom, Demands $300 Within 100 Hours And Threatens To Encrypt Hard Drive
A new malware spreading around the Internet in recent months holds every file on a computer for ransom. Unless the user pays $300 in bitcoins to the hacker responsible for the infection within 100 hours, the hacker threatens to forever deny the user access to his or her files.
The malware, which is known as CryptoLocker, is not just an empty threat. If the hacker's demands aren’t met, the computer files get cryptographically locked, making it almost impossible to access them. A ticking clock showing the time limit makes CryptoLocker just a bit more terrifying.
CryptoLocker is spread through phony emails designed to look like they're from legitimate businesses and fake FedEx and UPS tracking notifications. Once opened, CryptoLocker installs itself in the “Documents and Settings” folder, scans the hard drive and encrypts certain file types, including documents associated with Microsoft Word and Adobe Photoshop. CryptoLocker then launches a pop-up window with the 100-hour countdown and provides details on how to pay the ransom.
If the ransom is paid before the deadline, a key is given to decrypt the files. If not, the key is destroyed and the files are effectively lost forever. Even advanced software security companies don’t really have ways to restore the locked hard drive. Catching the hackers behind CryptoLocker may be the only way to retrieve the files.
The hackers are covering their tracks by using Bitcoins, a digital currency designed to be as anonymous as cash. Payments are made with a Green Dot MoneyPak, a reloadable debit card.
There is a growing trend in this type of malware,know as known as “ransomware,” but CrytpoLocker is the most dangerous one to pop up so far. Normally the threats are empty or the malware does something completely fixable, such as freezing the computer.
The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
A new malware spreading around the Internet in recent months holds every file on a computer for ransom. Unless the user pays $300 in bitcoins to the hacker responsible for the infection within 100 hours, the hacker threatens to forever deny the user access to his or her files.
The malware, which is known as CryptoLocker, is not just an empty threat. If the hacker's demands aren’t met, the computer files get cryptographically locked, making it almost impossible to access them. A ticking clock showing the time limit makes CryptoLocker just a bit more terrifying.
CryptoLocker is spread through phony emails designed to look like they're from legitimate businesses and fake FedEx and UPS tracking notifications. Once opened, CryptoLocker installs itself in the “Documents and Settings” folder, scans the hard drive and encrypts certain file types, including documents associated with Microsoft Word and Adobe Photoshop. CryptoLocker then launches a pop-up window with the 100-hour countdown and provides details on how to pay the ransom.
If the ransom is paid before the deadline, a key is given to decrypt the files. If not, the key is destroyed and the files are effectively lost forever. Even advanced software security companies don’t really have ways to restore the locked hard drive. Catching the hackers behind CryptoLocker may be the only way to retrieve the files.
The hackers are covering their tracks by using Bitcoins, a digital currency designed to be as anonymous as cash. Payments are made with a Green Dot MoneyPak, a reloadable debit card.
There is a growing trend in this type of malware,know as known as “ransomware,” but CrytpoLocker is the most dangerous one to pop up so far. Normally the threats are empty or the malware does something completely fixable, such as freezing the computer.
The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
Last edited by Ponee on Sun Nov 03, 2013 5:20 pm; edited 1 time in total
Ponee- Admin
- Posts : 38256
Join date : 2011-08-09
Re: VIRUS WARNING!! This is a REAL VIRUS --- Please Read
According to various accounts, users whose computers have been infected by CryptoLocker have been able to restore their files by paying the demanded ransom (usually $300 to be paid within 72 hours), and computer security companies haven't yet come up with a solid defense against the CryptoLocker malware:
As the Guardian noted of CryptoLocker and its victims:
[/color]
Read more at http://www.snopes.com/computer/virus/cryptolocker.asp#UeD6jiyelPECceqU.99[/color]
According to various accounts, users whose computers have been infected by CryptoLocker have been able to restore their files by paying the demanded ransom (usually $300 to be paid within 72 hours), and computer security companies haven't yet come up with a solid defense against the CryptoLocker malware:
As the Guardian noted of CryptoLocker and its victims:
[/color]
Read more at http://www.snopes.com/computer/virus/cryptolocker.asp#UeD6jiyelPECceqU.99[/color]
According to various accounts, users whose computers have been infected by CryptoLocker have been able to restore their files by paying the demanded ransom (usually $300 to be paid within 72 hours), and computer security companies haven't yet come up with a solid defense against the CryptoLocker malware:
Read more at http://www.snopes.com/computer/virus/cryptolocker.asp#UeD6jiyelPECceqU.99[/color]

If the ransom is paid before the deadline, a key is given to decrypt the files. If not, the key is destroyed and the files are effectively lost forever. Even advanced software security companies don't really have ways to restore the locked hard drive. Catching the hackers behind CryptoLocker may be the only way to retrieve the files.
The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
[color]The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
As the Guardian noted of CryptoLocker and its victims:
[/color]
"If you haven't got a backup and you get hit by CryptoLocker, you may as well have dropped your PC over the side of a bridge," says Paul Ducklin, security adviser for anti-virus software company Sophos. Even if you had backed up your files, he says, if your back-up device was connected to your computer when CryptoLocker struck, you may not be able to recover them. Similarly, all the files in shared network drives that were connected at the time of the attack could also become encrypted and inaccessible.
CryptoLocker currently only affects PCs and can easily be removed with anti-virus software, but its effects cannot. "I don't think anyone in the world could break the encryption," says Gavin O'Gorman, spokesman for internet security firm Symantec. "It has held up for more than 30 years."
Ryan Rubin, MD of global risk consultancy Protiviti, agrees: "CryptoLocker has been designed to make money using well-known, publicly available cryptography algorithms that
were developed by governments and other [legitimate] bodies. Unless you have the key, you simply cannot unlock the data that is encrypted."
So should anyone hit by CryptoLocker pay up? "You'd be in the same situation if your laptop got stolen — it just feels worse because you know that there is someone out there who has got this key. If your data is worth $300 to you, it must be very tempting to pay up, just in case it works," Ducklin says.
According to Symantec, around 3% of people hand over money in the hope of getting their data back. "But remember, you're dealing with criminals," Rubin says. "There is no guarantee they'll send you the key, and if they know you're susceptible to blackmail what is to stop them from doing it again?"
Bear in mind that every penny you pay them will fund their endeavors to target other victims. "If even a few victims pay then the cybercriminals will think they have got a viable business model and keep infecting people and asking for ransoms. If nobody pays, they will stop these campaigns," says Dmitri Bestuzhev, spokesperson for Kaspersky anti-virus software
[color]CryptoLocker currently only affects PCs and can easily be removed with anti-virus software, but its effects cannot. "I don't think anyone in the world could break the encryption," says Gavin O'Gorman, spokesman for internet security firm Symantec. "It has held up for more than 30 years."
Ryan Rubin, MD of global risk consultancy Protiviti, agrees: "CryptoLocker has been designed to make money using well-known, publicly available cryptography algorithms that
So should anyone hit by CryptoLocker pay up? "You'd be in the same situation if your laptop got stolen — it just feels worse because you know that there is someone out there who has got this key. If your data is worth $300 to you, it must be very tempting to pay up, just in case it works," Ducklin says.
According to Symantec, around 3% of people hand over money in the hope of getting their data back. "But remember, you're dealing with criminals," Rubin says. "There is no guarantee they'll send you the key, and if they know you're susceptible to blackmail what is to stop them from doing it again?"
Bear in mind that every penny you pay them will fund their endeavors to target other victims. "If even a few victims pay then the cybercriminals will think they have got a viable business model and keep infecting people and asking for ransoms. If nobody pays, they will stop these campaigns," says Dmitri Bestuzhev, spokesperson for Kaspersky anti-virus software
Read more at http://www.snopes.com/computer/virus/cryptolocker.asp#UeD6jiyelPECceqU.99[/color]
According to various accounts, users whose computers have been infected by CryptoLocker have been able to restore their files by paying the demanded ransom (usually $300 to be paid within 72 hours), and computer security companies haven't yet come up with a solid defense against the CryptoLocker malware:
If the ransom is paid before the deadline, a key is given to decrypt the files. If not, the key is destroyed and the files are effectively lost forever. Even advanced software security companies don't really have ways to restore the locked hard drive. Catching the hackers behind CryptoLocker may be the only way to retrieve the files.
The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
[color]The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
As the Guardian noted of CryptoLocker and its victims:
[/color]
"If you haven't got a backup and you get hit by CryptoLocker, you may as well have dropped your PC over the side of a bridge," says Paul Ducklin, security adviser for anti-virus software company Sophos. Even if you had backed up your files, he says, if your back-up device was connected to your computer when CryptoLocker struck, you may not be able to recover them. Similarly, all the files in shared network drives that were connected at the time of the attack could also become encrypted and inaccessible.
CryptoLocker currently only affects PCs and can easily be removed with anti-virus software, but its effects cannot. "I don't think anyone in the world could break the encryption," says Gavin O'Gorman, spokesman for internet security firm Symantec. "It has held up for more than 30 years."
Ryan Rubin, MD of global risk consultancy Protiviti, agrees: "CryptoLocker has been designed to make money using well-known, publicly available cryptography algorithms that
were developed by governments and other [legitimate] bodies. Unless you have the key, you simply cannot unlock the data that is encrypted."
So should anyone hit by CryptoLocker pay up? "You'd be in the same situation if your laptop got stolen — it just feels worse because you know that there is someone out there who has got this key. If your data is worth $300 to you, it must be very tempting to pay up, just in case it works," Ducklin says.
According to Symantec, around 3% of people hand over money in the hope of getting their data back. "But remember, you're dealing with criminals," Rubin says. "There is no guarantee they'll send you the key, and if they know you're susceptible to blackmail what is to stop them from doing it again?"
Bear in mind that every penny you pay them will fund their endeavors to target other victims. "If even a few victims pay then the cybercriminals will think they have got a viable business model and keep infecting people and asking for ransoms. If nobody pays, they will stop these campaigns," says Dmitri Bestuzhev, spokesperson for Kaspersky anti-virus software
[color]CryptoLocker currently only affects PCs and can easily be removed with anti-virus software, but its effects cannot. "I don't think anyone in the world could break the encryption," says Gavin O'Gorman, spokesman for internet security firm Symantec. "It has held up for more than 30 years."
Ryan Rubin, MD of global risk consultancy Protiviti, agrees: "CryptoLocker has been designed to make money using well-known, publicly available cryptography algorithms that
So should anyone hit by CryptoLocker pay up? "You'd be in the same situation if your laptop got stolen — it just feels worse because you know that there is someone out there who has got this key. If your data is worth $300 to you, it must be very tempting to pay up, just in case it works," Ducklin says.
According to Symantec, around 3% of people hand over money in the hope of getting their data back. "But remember, you're dealing with criminals," Rubin says. "There is no guarantee they'll send you the key, and if they know you're susceptible to blackmail what is to stop them from doing it again?"
Bear in mind that every penny you pay them will fund their endeavors to target other victims. "If even a few victims pay then the cybercriminals will think they have got a viable business model and keep infecting people and asking for ransoms. If nobody pays, they will stop these campaigns," says Dmitri Bestuzhev, spokesperson for Kaspersky anti-virus software
Read more at http://www.snopes.com/computer/virus/cryptolocker.asp#UeD6jiyelPECceqU.99[/color]
According to various accounts, users whose computers have been infected by CryptoLocker have been able to restore their files by paying the demanded ransom (usually $300 to be paid within 72 hours), and computer security companies haven't yet come up with a solid defense against the CryptoLocker malware:
If the ransom is paid before the deadline, a key is given to decrypt the files. If not, the key is destroyed and the files are effectively lost forever. Even advanced software security companies don't really have ways to restore the locked hard drive. Catching the hackers behind CryptoLocker may be the only way to retrieve the files.
The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
[color]The good news is that paying the ransom does actually decrypt the files, and the hackers behind CryptoLocker so far have been honest and not reinfected computers after the ransom is paid.
Security companies are working on a protection, but there isn’t one yet. Users should remain vigilant about their security online, double-checking the legitimacy of links received in emails and social media messages.
Read more at http://www.snopes.com/computer/virus/cryptolocker.asp#UeD6jiyelPECceqU.99[/color]

Ponee- Admin
- Posts : 38256
Join date : 2011-08-09
Purpleskyz- Admin
- Posts : 5765
Join date : 2011-08-16
Location : Woodstock Nation
Re: VIRUS WARNING!! This is a REAL VIRUS --- Please Read
Little turds!!
*****************
All we have to do is decide what to do with the time that is given to us.........~Gandalf~
Come visit me: www.alleysplace.net
Facebook: www.facebook.com/alleysplace1/
alleyrose- Super Moderator
- Posts : 2851
Join date : 2011-08-24
Location : Australia
Re: VIRUS WARNING!! This is a REAL VIRUS --- Please Read
This is the real deal. The good news is the risk is low and as long as you use common sense, it should not be a problem ... It is actually Trojan.Ransomlock From Symantic
Infection
This threat is distributed through several means. Malicious websites, or legitimate websites that have been compromised, may drop the threat onto a compromised computer. This drive-by-download often happens surreptitiously. Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software. Ransomware is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.
Functionality
The primary objective of the threat family is to make money. These programs lock the compromised computer, preventing the user from accessing their files. Once the computer has been locked, the threat displays a notice page requesting money to be paid in order for the computer to be unlocked. The amount of money requested can vary from a few dollars to several thousand dollars. Payment is usually requested by an anonymous online payment method or by texting a premium rate phone number.
It is worth noting that if the ransom is paid, there is no guarantee that the malware authors will unlock the compromised computer.
The programs often claim to be from governmental or law enforcement agencies, and tell the user that illegal or compromising material has been found on the computer.
There are a number of variations, here is one:

Infection
This threat is distributed through several means. Malicious websites, or legitimate websites that have been compromised, may drop the threat onto a compromised computer. This drive-by-download often happens surreptitiously. Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software. Ransomware is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.
Functionality
The primary objective of the threat family is to make money. These programs lock the compromised computer, preventing the user from accessing their files. Once the computer has been locked, the threat displays a notice page requesting money to be paid in order for the computer to be unlocked. The amount of money requested can vary from a few dollars to several thousand dollars. Payment is usually requested by an anonymous online payment method or by texting a premium rate phone number.
It is worth noting that if the ransom is paid, there is no guarantee that the malware authors will unlock the compromised computer.
The programs often claim to be from governmental or law enforcement agencies, and tell the user that illegal or compromising material has been found on the computer.
There are a number of variations, here is one:

*****************
Trust but Verify --- R Reagan

"Rejoice always, pray without ceasing, in everything give thanks; for this is the will of God in Christ Jesus for you."1 Thessalonians 5:14–18




Kevind53- Super Moderator
- Posts : 27252
Join date : 2011-08-09
Age : 24
Location : Umm right here!
Re: VIRUS WARNING!! This is a REAL VIRUS --- Please Read
The risk with THIS PARTICULAR ONE is NOT Low. Maybe some of the similiar ones ...
Ponee- Admin
- Posts : 38256
Join date : 2011-08-09
Re: VIRUS WARNING!! This is a REAL VIRUS --- Please Read
According to Symantic it is. That is you have to download and open a file containing it from an e-mail or a web site. Remember risk is related to the ability of the program to spread, not the damage it might do. Any malicious program can do considerable damage, but not all can spread themselves. It does not have the ability spread itself or infect your computer just by visiting a website.
If your computer is properly updated, and you have an up to date antivirus program protecting your computer you would have to choose to infect your computer. Again, don't be stupid and you have nothing to worry about. There are a number of variations, some say that porn was found on the computer, or purport to be from law enforcement agencies, and some just say give us $$ or kiss your files goodby. Same basic program, different front ends.
If your computer is properly updated, and you have an up to date antivirus program protecting your computer you would have to choose to infect your computer. Again, don't be stupid and you have nothing to worry about. There are a number of variations, some say that porn was found on the computer, or purport to be from law enforcement agencies, and some just say give us $$ or kiss your files goodby. Same basic program, different front ends.
*****************
Trust but Verify --- R Reagan

"Rejoice always, pray without ceasing, in everything give thanks; for this is the will of God in Christ Jesus for you."1 Thessalonians 5:14–18




Kevind53- Super Moderator
- Posts : 27252
Join date : 2011-08-09
Age : 24
Location : Umm right here!
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
» Iraqi Dinar Scam?
» Currency revaluation scams have found a new home on Etsy
» Melanie Hinds ADMITS to STEALING From a BANK! 9/1/23
» The Fundamentals of Finance Dinar Scam Video
» I have some sad news...PurpleSkyz has passed
» Legal Translation Dubai
» Time Tested Tony
» Oh Ye of Little Faith
» Delta 8 hemp flower
» CBD Vape Cartridges
» The Death Of The Iraqi Economist, Sinan Al-Shabibi
» A DEATH AT 22
» Noah's Ark
» Follow the clicks
» Everyone’s Talking About Currencies: 21 Points
» DRAMA In DINARLAND! Melanie vs. Nader! 7/14/23
» Tony Renfrow, serving up Nothing Burgers since 2008
» BRICS vs. Davos: The Race to a New World Currency
» Unicorns Make Everything Right Again