Timeline for Why are ransom attacks successful?
Current License: CC BY-SA 3.0
13 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Oct 2, 2015 at 14:53 | comment | added | Ajedi32 | @silverpenguin Yeah, that sounds like some really crappy ransomware. I've never encountered any ransomware in the wild, but all the examples I've heard about up til now use asymmetric cryptography to encrypt files so only the attacker can recover the data. The kind of ransomware you're describing doesn't seem like a serious threat at all. "Really? You're going to delete my files? Care to explain how exactly you're going to manage that after I unplug my hard drive?" | |
| Oct 2, 2015 at 14:47 | comment | added | TheHidden | @Ajedi32 Not all ransomware works the same, some just lock of the computer and threaten to delete the files ( this is one i HAVE encountered)... I would like to get hold of some ransomware, just so i could see how they manage the keys... Im guessing they use PPK if not feels like you would be able to trace the key on the harddisk some where | |
| Oct 2, 2015 at 14:37 | comment | added | Ajedi32 | @silverpenguin Ransomware works by encrypting the files on your disk with a key only the software's creator knows. So even if that method you cite did remove the ransomware software (and my guess is it won't, as I suspect system restore it only works on well-behaved software), it still wouldn't recover your files. | |
| Oct 2, 2015 at 9:59 | comment | added | TheHidden | Ransomware is very easy to get around, if you follow your microsoft updates (going on a standard windows user) your system keeps restore points, ransomware is an application so resetting back to a previous point keeps your files but removes all applications. booting in safe mode will allow you to get around this (well this is what I had to do for a neighbour when they went on naughty websites D: ) | |
| Oct 1, 2015 at 15:08 | history | edited | AbsoluteƵERØ | CC BY-SA 3.0 | added 48 characters in body |
| Oct 1, 2015 at 15:00 | history | edited | AbsoluteƵERØ | CC BY-SA 3.0 | added 48 characters in body |
| Sep 4, 2015 at 16:26 | history | edited | AbsoluteƵERØ | CC BY-SA 3.0 | added 1500 characters in body |
| Sep 4, 2015 at 16:10 | comment | added | AbsoluteƵERØ | @Christian exactly. You're still at risk. | |
| Aug 13, 2015 at 19:57 | comment | added | Rick Chatham | I'd argue that also, at least recently, ransom attacks are far more common than hard drive failure. Last year I had one co-worker fall prey to the former, and zero instances of the latter. | |
| Aug 11, 2015 at 4:01 | vote | accept | GreenAsJade | ||
| Aug 7, 2015 at 12:17 | comment | added | Christian | Even if you pay the ransom you should still have to investigate how the breach happened. | |
| Aug 7, 2015 at 6:28 | history | edited | AbsoluteƵERØ | CC BY-SA 3.0 | added 462 characters in body |
| Aug 7, 2015 at 6:22 | history | answered | AbsoluteƵERØ | CC BY-SA 3.0 |