Forum Home
PC World Chat
 
Thread ID: 141874 2016-03-14 13:06:00 Ransomware- Scary ****. baabits (15242) PC World Chat
Post ID Timestamp Content User
1417487 2016-03-15 00:53:00 Like ... your spell-checker ... :)

Typos...yeah, it does highlight it, but I hit post before fixing.
pctek (84)
1417488 2016-03-15 06:20:00 To get on topic, the loss of data isn't the real problem with this story - that's easily mitigated by backups.
Dealing with other peoples sensitive data requires more care and responsibility - and prudent measures to prevent loss.

Running a bollocks "AV" on a gaming OS as an "admin user" and clicking-on-the-attachment *really* doesn't come close and should, IMHO, leave one wide open to civil (if not criminal) liability.

For a car analogy, there are significantly higher compliance, auditing and enforcement standards for 'public transport' operators than private vehicle owners and it is about time there were better efforts to up the standard of data security for those who are "carrying" others sensitive data, given the increasing importance and reach of the data being collected/stored/shared/stolen.

Public reporting of data breaches such as this should be compulsory.

Has he told his clients that international criminal organisations may have all of the details they had previously given him? (being a barrister there could be some juicy and embarrasing things that could be quite easily "monetised").

You should strongly suggest that he read this - privacy.org.nz
and consider making a (currently voluntary) 'data breach notification'.
fred_fish (15241)
1417489 2016-03-15 07:01:00 Bleeping Computer gives a good rundown of Locky www.bleepingcomputer.com

looks like no fix yet so prevention is the best bet
Lawrence (2987)
1417490 2016-03-15 08:29:00 I have been out of the game for some years now. XP was the hot number when I quit working on computers for my small client group. As we know, one must keep up on things or end up gradually falling behind.

What I am getting at is, are the following precautions adequate? Apart from using Windows security anti virus :) and never opening strange emails that Spark so nicely put in my Spam folder.

I back up our home laptops to an external HDD using Acronis. I have a boot disk for restoring mine and a USB stick for SWMBO's lappy. I assume the disk/USB will do as told and boot to Acronis before the virus starts, and restores should be no problem?

Thanks for any advice

Ken
kenj (9738)
1417491 2016-03-15 09:07:00 For home use, privilege separation is an easy and effective defense, along with offline, versioned backups.

Run your regular desktop as a limited user and have separate accounts for admin and backup (and whatever else you want to keep separate) with appropriate privileges - that way if your regular web browsing, email using, usb inserting user gets owned you are much less likely to lose the install or backups (depending on what privilege escalation bugs are available to the attacker).

No matter the OS, the soft spot is always the human sat in front of it - think before you click :)
fred_fish (15241)
1417492 2016-03-15 18:12:00 are the following precautions adequate? Apart from using Windows security anti virus :) and never opening strange emails that Spark so nicely put in my Spam folder.

I back up our home laptops to an external HDD using Acronis.

Yes.
1)Don't open the attachment
2)Have backups.
pctek (84)
1417493 2016-03-15 21:54:00 Gee I wonder what all these invoices are that have been hitting my rarely used Orcon mailbox this week.
Scary thing is only AVG and Kaspersky are picking this particular one up at the moment :waughh:
Renegade (16270)
1417494 2016-03-16 02:07:00 Just got back from a job, ( well 4 in one really) the persons email when it was repaired, Nod32 went nuts over 80 of them all described as Trojans.

Eset added in the detection signatures on Feb 17, 2016 Data base 13043 Current Database is 13184 As long as Nods setup fully it should detect it.

Still boils down to common sense - as I say to everyone, if someone sends you an invoice or document in a zipped file delete it, then if its someone you actually know contact them and tell them to send it again, this time unzipped.
wainuitech (129)
1417495 2016-03-16 02:18:00 Common sense won't help though if it's a scripted exploit embedded in an autoloading ad banner on a legit website. fred_fish (15241)
1417496 2016-03-16 06:10:00 Looks like there is more www.neowin.net

This will catch a few out as fred said
Lawrence (2987)
1 2 3