ransomware

Mon
11
Jun
Dennis Faas's picture

How to Fix: Computer / Network Infected with Ransomware (10 Steps)

Infopackets Reader Robert S. writes: " Dear Dennis, I have a network of computers I use for accounting purposes. Suddenly, many of my desktop icons started appearing to have strange names, such as ... '1HjgN1BdTZE3OIqorcj2E5b6CXIE=gdFae89IWgo0RrVfPbCHt851oogccs.ssimpotashka[at]gmail.com'. When I try to open these files, Windows warns me the file may be malicious. When I look in my Documents folder, I see more files similarly named to the one I just mentioned. Some of my .PDF files won't even open. On the desktop there is a text document that says ' HOW TO DECRYPT YOUR FILES.TXT ' - when I open ... (view more)

Wed
11
Apr
John Lister's picture

New Ransomware Demand: Play Video Game, Not Cash

A newly unleashed ransomware attack doesn't force victims to pay money to regain access to files. Instead, it demands they play a video game. It's not clear yet what the point of the attack is, though it's most likely the work of a prankster who ... wants to test their skills at creating and distributing ransomware without doing any permanent harm. Ransomware is a form of malware that encrypts files on a computer and normally only unlocks them if the victim pays a fee. In most cases every file on the computer is encrypted, meaning that victims are locked out of their systems and unable to access ... (view more)

Tue
04
Jul
John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Wed
28
Jun
John Lister's picture

Windows Bug Exploited Again by Ransomware

Businesses around the world are reporting computer problems that appear to be another rapidly-spreading ransomware attack. It appears likely to be exploiting the same Windows flaw as the recent WannaCry attack. Details were still emerging at the ... time of writing, but high profile businesses including drug giant Merck, a British advertising agency and a Danish shipping company are known to have been compromised. Ukraine's government network also appears to have been hit. (Source: nytimes.com ) File Index Compromised As with WannaCry, the malware appears to be designed to lock up and encrypt ... (view more)

Wed
14
Jun
John Lister's picture

Patch Your PC: Yet Another Massive Exploit Discovered

Microsoft has issued three updates to fix flaws in older, unsupported versions of Windows. It's an unusual move that follows the discovery that both the National Security Agency (NSA) and outside hackers are exploiting the flaws , similar to the one ... that allowed the WannaCry Ransomware worm to spread just a few weeks ago. The updates cover both Windows and Windows Server editions going right back to XP . They'll be issued through the usual automated updates, which means people on Windows 8.1 and later shouldn't need to do anything. Those on earlier systems may need to manually ... (view more)

Tue
16
May
John Lister's picture

WannaCry Ransomware Worm: What You Need to Know

Beginning Friday, May 12, 2017, reports surfaced of a new Internet worm capable of infecting Windows machines instantaneously. The worm has been dubbed "WCRY" or "WannaCry" because of its malicious intent to install ransomware on the target machine. ... The Internet worm was made possible because of a leaked NSA (national security agency) document which essentially explained how to carry out the exploit. In this case, the malicious software locks computers such that their files are encrypted and cannot be accessed unless the victim pays a ransom (and the culprits then stand by ... (view more)

Wed
01
Feb
John Lister's picture

Hotel Ditches Key Cards After Ransomware Attack

Hackers have forced a hotel to ditch its electronic room key system and return to physical keys. But reports that guests were locked in and out of their room turned out to be overblown. The Seehotel Jaegewirt in Austria has been targeted by at least ... four different attacks on its computer system. The most recent involved the system data being encrypted and the hackers demanding a payment in the virtual currency Bitcoin equivalent to around $1,600. The hotel mentioned the attack in a press release designed to raise awareness and warn other hotels of the need to maintain security. A news agency ... (view more)

Wed
14
Dec
John Lister's picture

New Ransomware: Scam Two Friends to Unlock Your PC

A new form of ransomware offers victims the chance to escape the release fee by fooling two friends into paying up instead. A security expert likened it to a malware version of a pyramid scheme. Traditionally ransomware involves malware getting onto ... a computer and then encrypting all files, with an on-screen message demanding the victim pay a fee to regain access. It's unknown what proportion of people pay up, but some big organizations such as hospitals and police forces are known to have paid the fee in the past, rather than lose sensitive data or access to control systems. The new ... (view more)

Tue
19
Jul
John Lister's picture

'Lazy' Ransomware Deletes Every File in Sight

Is there fair play amongst ransomware scammers? A particularly lazy variant of "ransomware" is making its rounds, though researchers say that paying up will never pay off. For the most part, ransomware usually involves a nasty malware program ... encrypting files on a PC, followed by a promise of a decryption key - but only if the victim pays a ransom. It would make sense that if people stopped believing this would happen, they would stop handing over the cash. Files Deleted Rather Than Encrypted Now security company Talos has spotted a variant where there's absolutely no prospect ... (view more)

Wed
13
Jul
John Lister's picture

New Research Promises to Halt Ransomware in its Tracks

Researchers say they've found a way of severely limiting the damage ransomware causes. Meanwhile California legislators are mulling over new laws specifically aimed at the tactic. Ransomware involves attackers remotely installing malicious software ... that encrypts files and makes them inaccessible without an unlock key. In many cases, this means victims can't access the data and may be unable to use the computer at all. The attackers then demand a fee to provide the unlock key. The tactic has led to controversy over whether victims should pay the fee , something critics say merely encourages ... (view more)

Pages

Subscribe to RSS - ransomware