Skip to main content

Timeline for Why are ransom attacks successful?

Current License: CC BY-SA 3.0

13 events
when toggle format what by license comment
Oct 2, 2015 at 14:53 comment added Ajedi32 @silverpenguin Yeah, that sounds like some really crappy ransomware. I've never encountered any ransomware in the wild, but all the examples I've heard about up til now use asymmetric cryptography to encrypt files so only the attacker can recover the data. The kind of ransomware you're describing doesn't seem like a serious threat at all. "Really? You're going to delete my files? Care to explain how exactly you're going to manage that after I unplug my hard drive?"
Oct 2, 2015 at 14:47 comment added TheHidden @Ajedi32 Not all ransomware works the same, some just lock of the computer and threaten to delete the files ( this is one i HAVE encountered)... I would like to get hold of some ransomware, just so i could see how they manage the keys... Im guessing they use PPK if not feels like you would be able to trace the key on the harddisk some where
Oct 2, 2015 at 14:37 comment added Ajedi32 @silverpenguin Ransomware works by encrypting the files on your disk with a key only the software's creator knows. So even if that method you cite did remove the ransomware software (and my guess is it won't, as I suspect system restore it only works on well-behaved software), it still wouldn't recover your files.
Oct 2, 2015 at 9:59 comment added TheHidden Ransomware is very easy to get around, if you follow your microsoft updates (going on a standard windows user) your system keeps restore points, ransomware is an application so resetting back to a previous point keeps your files but removes all applications. booting in safe mode will allow you to get around this (well this is what I had to do for a neighbour when they went on naughty websites D: )
Oct 1, 2015 at 15:08 history edited AbsoluteƵERØ CC BY-SA 3.0
added 48 characters in body
Oct 1, 2015 at 15:00 history edited AbsoluteƵERØ CC BY-SA 3.0
added 48 characters in body
Sep 4, 2015 at 16:26 history edited AbsoluteƵERØ CC BY-SA 3.0
added 1500 characters in body
Sep 4, 2015 at 16:10 comment added AbsoluteƵERØ @Christian exactly. You're still at risk.
Aug 13, 2015 at 19:57 comment added Rick Chatham I'd argue that also, at least recently, ransom attacks are far more common than hard drive failure. Last year I had one co-worker fall prey to the former, and zero instances of the latter.
Aug 11, 2015 at 4:01 vote accept GreenAsJade
Aug 7, 2015 at 12:17 comment added Christian Even if you pay the ransom you should still have to investigate how the breach happened.
Aug 7, 2015 at 6:28 history edited AbsoluteƵERØ CC BY-SA 3.0
added 462 characters in body
Aug 7, 2015 at 6:22 history answered AbsoluteƵERØ CC BY-SA 3.0