Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
It has to be installed. In general, the people dumb enough to get hit by ransomware wouldn't be smart enough to install this.
The only place I can see it being somewhat worthwhile is on an office network or similar.. Where little Randy Retard is downloading torrents and the encryption propogates across the network, infecting 'innocent' bystanders.
This should be something that Antivirus detects before it gets a foothold.
It's no more difficult to install than any other program the average home user might install.
None of the ransomware that I'm aware of targets other computers on a network (yet), it will go after mapped network drives however. I don't see how torrents fit in to anything
Not that it's technical to install.. They're just not smart enough to know that they'd need to install it. Half of them run with the copy of McAfee that comes with the PC as their "Virus Protection".. You know, the one that says it expired 300 days ago.
Torrents come into play because many of them contain viruses. People will go out and search for "Office Serial Number" and get a nice EXE file that "generates an office key".
Torrents come into play because many of them contain viruses. People will go out and search for "Office Serial Number" and get a nice EXE file that "generates an office key".
Not something I see a lot of on business networks. It's more likely to get in via compromised web sites, advertisements, or emails.
I already have the paid version of MWB. They should merge this new application into MWB. I don't want to install or have to pay for a second application.
Not something I see a lot of on business networks. It's more likely to get in via compromised web sites, advertisements, or emails.
Depends on the business.
I got a PC in from a restaurant.. was their back office PC. It had been hit with one of the ransomware variants. Just wiped the drive and reloaded. I've had other PCs come in that just had so much porn it should have been illegal.
And, they've come in with torrent software running on them. Thankfully, the kazaa/napster days are over.
The encrypting ransomware ones.. At least with those.. I don't even try to unencrypt them. I presume that "Windows Antivirus 2012" thing is still out there. The one that would basically lock the PC and only show the link to download some bogus antivirus program.. That one was such a massive pain in the butt to clean up. And, the bad part is.. It CAN be cleaned up, so, I'd do it. I'd have saved myself an assload of time just formatting the thing.
It has to be installed. In general, the people dumb enough to get hit by ransomware wouldn't be smart enough to install this.
The only place I can see it being somewhat worthwhile is on an office network or similar.. Where little Randy Retard is downloading torrents and the encryption propogates across the network, infecting 'innocent' bystanders.
This should be something that Antivirus detects before it gets a foothold.
You're not paranoid enough.
Consider the following scenarios:
1. You download software X from legitimate source Y. Legitimate source Y's download servers have been compromised and are handing out infected copies of software X. You don't bother running a checksum on the software, because you downloaded it from legitimate source Y. You install and you see this sweet little message:
"Hello! Your files have all been encrypted but they're still safe!"
2. You visit trusted site Z who uses ad provider W. Ad provider W was compromised and has a rogue server handing out ads that utilize several Flash Game over exploits. You trust site Z, so you allow web content to run. Thanks to Adobe's wonderful software design, you see this message:
"Hello! Your files have all been encrypted but they're still safe!"
3. You fall victim to any one of the latest zero days that in the past allowed things such as transferring files without authentication to a victim computer, local privilege escalation, auto-execution of code from plugging a flash drive in, escaping the "secure" chrome sandbox and breaking into your computer, etc. These things have all happened and there's no reason to suspect they aren't still happening.
If you use Adobe Reader, Outlook, Skype, Microsoft Word, a computer etc. etc. there is no reason to think you're immune because you're more tech literate. No doubt if you keep your software up to date, you have a better chance than the lay user who does not; but you are NOT invincible.
I guess this is another reason why people should not store personal files on their local hard drive. Personally I use Google Drive cloud storage. Not to say that couldn't be compromised either, but at least then someone else is responsible for the cleanup.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.