Forum Home
Press F1
 
Thread ID: 143754 2017-04-02 05:09:00 Ransomware questions Tony (4941) Press F1
Post ID Timestamp Content User
1433706 2017-04-09 23:15:00 I don't understand that. If you need an encrypted file plus the same file unencrypted, why do you need the decrypter?

exactly the point. Thats why I initially said zero chance (actually a very small chance of recovery)
- might have a copy of a single file on a USB stick, or emailed it to someone at some time .

And now things are changing again.
Some newer types make no attempt to make files recoverable even if you pay. Its now easier to just scam you & give no unencryption
blog.kaspersky.com
"The ransomware states that it has moved the user’s files into a “hidden, encrypted partition,” but in reality, it deleted them before even showing the ransom message. So there is no way to retrieve them.
simply destroying the files means that the criminals don’t need to learn the fine points of cryptoblocking and locking.
Whenever a user clicks the button, a message appears, saying the payment was not verified and that one file will be deleted each time the button is pressed without the criminals behind Ranscam having been paid. That is probably supposed to make users nervous and persuade them to pay several times."
1101 (13337)
1433707 2017-04-10 02:07:00 It's all very scary. I'll chase up my friend and see how her stepdad is doing. Tony (4941)
1433708 2017-04-10 02:29:00 Makes sense actually, my assumption is if you can find at least 1 file that is unecrypted and the same as an encrypted one the tool can use it to figure out what key was used and then apply that to all the rest of the files.
What I'm wondering is if there's a standard system file that meets the size requirements that you could copy off another machine with the same OS version? might be worth looking into.
dugimodo (138)
1433709 2017-04-10 02:34:00 Makes sense actually, my assumption is if you can find at least 1 file that is unecrypted and the same as an encrypted one the tool can use it to figure out what key was used and then apply that to all the rest of the files.
What I'm wondering is if there's a standard system file that meets the size requirements that you could copy off another machine with the same OS version? might be worth looking into.

Riiight. You only need one unencrypted/encrypted pair to be able to sort out the rest. Your suggestion about the possibility of a system file from another PC is worth looking into.
Tony (4941)
1433710 2017-04-10 04:16:00 Except the flaw in my theory is I don't think the system files get encrypted. dugimodo (138)
1433711 2017-04-10 04:20:00 It's not Rensenware ransomware is it? ( . neowin . net/news/new-ransomware-invites-you-to-play-a-game-and-unlock-your-data-with-a-high-score" target="_blank">www . neowin . net)

Because the guy who made / released this later apolgised for making it, and released a tool to decrypt the files .

This ransomware is different . You don't have to pay, you have to play a game and get a high score and it'll decrypt the files .
Speedy Gonzales (78)
1433712 2017-04-10 04:32:00 Except the flaw in my theory is I don't think the system files get encrypted.

Never let facts get in the way of a good theory, that's my motto...

And there are a few in this forum for whom that is not a joke, it's a way of life :)
Tony (4941)
1433713 2017-05-17 06:41:00 Apparently the old guy got his photos recovered but lost an autobiographical manuscript he was working on and maybe some genealogical stuff. I still don't know what flavour of ransomware it was or how much it cost him for the recovery. Tony (4941)
1433714 2017-05-17 21:07:00 Interesting,Eset fails to protect you from WannaCry also Microsoft Security Essentials fails

malwaretips.com

Edit- In the wrong thread but similar
Lawrence (2987)
1433715 2017-05-17 21:40:00 Interesting,Eset fails to protect you from WannaCry also Microsoft Security Essentials fails

malwaretips.com

Edit- In the wrong thread but similar Take those "lab" results with a grain of salt ( look how many lab tests say Norton, Avast etc are the best, yet see systems all the time riddled with infections). If you read the comments, Eset does protect, and in one of the posts is a link to esets site stating they have added protection. www.eset.com (www.eset.com)

Bit like the result -- "Microsoft Security Essentials Not protected" Considering as they point out at the beginning, "we used vulnerable Windows 7 systems " it boils down to if you have the patches Via Windows updates, then it cant attack. W10 was patched months ago. The Microsoft Security Essentials is the old version and is useless, where as the Windows Defender now in W10 is far better than its predecessor.
wainuitech (129)
1 2 3 4 5 6 7