Remove Bitcoin ransomware (Virus Removal Instructions ...

The three things that keep me up at night.

Tonight I read this article and while it doesn’t get too deep into the technical weeds, I thought I could do better by breaking down some of the IT threats and concerns that keep me up at night into more of a non-tech person’s language while giving real world examples why this stuff really does matter to everyone, not just the uber nerds, naysayers, and tinfoil hat wearing conspiracy theorists.
Security (both digital and physical) is something most people don’t understand and as a result they act like an ostrich by burying their head in the sand; if I can’t see it, it can’t see me. Until recently I was an IT consultant and would frequently bring this up to my clients. The usual reply I hear is along the lines of “but my company doesn’t have much money, isn’t a bank, doesn’t do anything interesting, etc. so they aren’t going to target me and I don’t have anything to worry about.” Sadly, this isn’t the case. These crooks “spray and pray” and will victimize anyone who gets caught in their snare. They will send out hundreds of millions of emails, compromise thousands of websites, and make tens of thousands of robocalls all with the expectation that they are only going to be able to victimize 0.0001% of their attempts.
For years there have been two big threats in the IT world that literally keep me up at night; regulatory compliance and ransomware. There is now a third, extortionware.
Regulatory compliance is an area business owners and executives commonly overlook because they don’t think it applies to their company because they’re not in health care or banking. PCI (Payment Card Industry), PII (Personal Identifiable Information), HIPAA (Health Insurance Portability and Accountability Act), and HITECH (Health Information Technology for Economic and Clinical Health Act) are the most common compliance standards and now cover just about every company in existence in the United States. If the company takes credit cards of any kind there are some levels of PCI compliance that they need to be adhered with. PII covers most HR information like social security numbers or driver license numbers. HIPAA and HITECH both cover information related to health records. This is one that most companies overlook because they don’t realize things like workmen’s compensation claims, HR records that discuss health related issues, etc. are all covered by these standards. Fines from the governing bodies that cover their respective compliance standards are usually preventable because they have general guidelines that cover what needs to be done to be in compliance on the logistical, physical, and digital fronts. If your company does anything with the European Union, then GDPR (General Data Protection Regulation) is a new regulation that has some pretty serious consequences if not followed properly.
Ransomware is a genre of computer virus that is just evil. It encrypts your data and give you a very short period of time (typically only a couple days) to pay the ransom using untraceable funds transfers via cryptocurrencies like Bitcoin. If you don’t pay the ransom in time they will delete the decryption key thus destroying all your data. If you do pay the ransom then chances are you will get your data back however you are likely very literally funding terrorism and/or some other kind of organized crime. These ransoms are also meant to be payable but be painful to pay. The newer ransomware variants will scan your network to get an idea of how big it is then adjust the ransom accordingly; the more devices, the higher the ransom. Typical ransoms start around a few thousand dollars and work their way up hundreds of thousands or even millions of dollars. If you’re infected with these viruses then the best course of action to remove it is to wipe your entire network (all servers, workstations, firewall and switch configs, etc.) and rebuild it from scratch while restoring your important data from backups into a separate clean environment, scanning it for any traces of the virus, then moving it into the newly rebuilt network. While this is typically more expensive than paying the ransom it is the only way you can be sure the virus is no longer on your network and thus capable of infecting everything all over again and repeating the ransom process.
Extortionware is similar to its older sibling ransomware in that the virus typically does all the same things however it adds an even more sinister twist, it copies your data offsite to a server only the criminals can access. They do this because of the increased number of companies that have opted to not pay the ransom and just rebuild their network. Using extortionware the criminals now have the company’s intellectual property (usually proprietary), HR data, internal memos, financial data, emails, etc.. Did someone say something unflattering about someone else in an email, did HR have a spreadsheet with every employee’s SSNs, hire dates, etc., or are there private financial records relating to an upcoming acquisition that your competitors shouldn’t know about? All of this and more will be used by the criminals to extort money from the company. This means that even if you have a rock solid backup of all your data, you still need to pay to prevent your data from being released to the public and/or press.
While this post just scratches the surface, it does cover the highlights on why I push for stronger passwords (longer is better than higher complexity, keeping non-company owned and unmanaged devices off internal networks, multiple factor authentication on everything, never sharing your passwords with anyone, running regular security related exercises, using unique passwords on everything, and using a reputable password manager to keep track of all your passwords.
submitted by tigerguppy126 to sysadmin [link] [comments]

Beware- Fake coronavirus Android app tries to get ransom in bitcoin

The app promises to warn you if a person with the virus is nearby, among other things. But when you launch it, it locks up your phone.
In scary times, people naturally look for information to ease their angst. And hackers naturally look for novel ways to trick scared people. Their latest invention: "COVID19 Tracker," a phony coronavirus tracking app that claims it will expose your social media accounts and delete all your phone's storage unless you cough up $100 in bitcoin.
Read more: Fake coronavirus Android app tries to get ransom in bitcoin
submitted by DecryptMedia to androidapps [link] [comments]

Customer hit with crypto-virus looking for advice

Have a customer hit with a Crypto virus on the 11th only just told us today. Able to retrieve company files from shadow copies on NAS but PC running QuickBooks is past point of no return.
First question is, files have .smile at the end, does anyone have any ideas what virus may have infected the system?
Second question, customer is prepared to pay ransom, against my advice he emailed them and they want .5 of a bitcoin. I'm not advocating this but he wants to try. What's the safest way to buy Bitcoin?
We know and he knows he should have backups in place, he was meant to take manual backups of QuickBooks but for whatever reason it did not happen, I'm not looking to portion blame and lesson has been learned.
Just looking for some guidance and advice on options.
Thanks guys.
EDIT: Thanks for all the input, everyone has been so helpful. We managed to figure out the virus was one of two MedusaLocker or GlobeImposter 2.0. Neither have a public decrypter and unlikely to be one due to a unique key assigned to each encrypted PC. Determined that source was an email with a zip file disguised as a .odt file. Police were called but referred to a site already recommended on this post. No cyber cover in insurance. Most files now recovered but some that can't and deciding whether to pay ransom or rebuild files. Post has been really helpful, wish I could share the amazing chocolate truffles that were supplied as a thanks.
submitted by dvdkp to msp [link] [comments]

How do I archive Ransomware files? (7zip)

I'm aware that files encrypted via viruses in the Crysis family are undecryptable until the creator releases the master key.
Knowing the history of users on bleepingcomputer forums releasing master keys to decrypt files, I'm counting on this slim chance to put my encrypted data in long-term storage until I have a chance to decrypt them.

This is not a "help me my files are encrypted" problem, but a "how do I compress encrypted video files if I can restore them in the future" type of question.

My son Jared was never the kind of kid that listened, he and his college buddies partied one night, his buddies were drunk, and was hit by a truck, only my son survived.
He had pieces of metal in his brain and needed to remove them surgically; I decided to put on a Go-Pro and record our journey, maybe someday we'll both look at these videos at laugh at each other.

To do his surgeries, I borrowed as much money as I could, even taking out my 401k with penalty. After three years of fighting, he had a brain infection on his left brain and was in a vegetated state, I was not financially capable of helping him, and I made a decision I still regret to this day... to cut off his life support.

It was the worst moment in my life, but I had accumulated terabytes of recordings, like him doing dumb things and telling inappropriate jokes, I often look at these recordings when I'm feeling down.

Last year, I was traveling to see my stepmother. Stupid as I am, I Googled how to remotely control my computer, as I wanted to look at my computer when I'm able to. I was recommended with windows rdp, not knowing what security risk it poses, I opened up my system to the interwebs, and made it vulnerable to hackers.

I was devastated when I came home, my work files are gone, that's fine for me, but my videos. Everything I worked for is now unopenable, attached with a ransom note demanding me to contact "support," the hackers asked for $5000 in bitcoin, I'm not a rich guy, and I do not have that kind of money.

After doing my research, I figured out how everything (technical) happened, but at this point, I'm counting on another computer guru to release a master key to decrypt these files.
All these files have their original file name, with an id, an email, and ends with .harma.

For now, I just need to put them in storage. How can I lossless compress them? If I use lossy compression, will I still be able to uncompress and decrypt them if someday the master keys are released?
I'm willing to sit and wait, maybe ten years down the road, these computer hackers will find some good inside them.
submitted by FolleyMel779 to techsupport [link] [comments]

How Ransomware Encryption Happens & 4 Methods for Recovery

We know how overwhelming it can feel to be the victim of a ransomware attack and how your business cannot operate due encrypted or locked files. This page delivers insight on why your files were encrypted or locked, and the options you have to decrypt ransomware. As a ransomware recovery service provider, we have helped thousands of clients successfully recover their data and decrypt their data.
Evaluating all options will include analyzing the encrypted files, and the least desirable option to pay the ransom demand if necessary. Our process helps provide critical insight into decrypting ransomware and the available options that clients have.
By the end of this piece, it is our goal to show you what is involved to successfully recover your files. This guide outlines what steps and research are necessary to decrypt or unlock your files from a ransomware attack.

You’re the victim of a ransomware attack

You arrive to work and start noticing suspicious alerts coming from your servers, and none of the databases are functional. Your co-workers are frantic and cannot access any of their data. You investigate further and find all of the files on your network are renamed and discover ransom notes, and a screen asking you to email someone if you want your data back. You finally realize that you are a victim of a ransomware attack, and all of your files are locked or encrypted.

3 Common Ways Your Files Were Encrypted or Locked

Ransomware succeeds when businesses have poor security hygiene. Organizations that lack policies & procedures around data security will have a higher risk of ransomware attacks. Here are some of the most common ways to fall victim to a ransomware attack:

Open Remote Desktop Protocol Ports (RDP)

Businesses that have improperly configured network security may leave their Remote Desktop Protocol (RDP) ports open. Unknowingly, this is the equivalent of leaving the front door unlocked when you leave your home: it provides an opportunity for cyber attacks to come through with little deterrence.
Once a hacker is connected to your network, they can install ransomware and additional back doors to access your network at a later date. A large percentage of ransomware attacks still use this method of attack because so many organizations are not even aware of this security vulnerability.

Phishing Attacks

Ransomware can infiltrate your network by a malicious email campaign known as a phishing attack. Ransomware operators use massive networks of internet-connected devices (botnets) to send phishing emails to unsuspecting victims. These emails intend to trick the receiver into clicking on a malicious attachment or link, which can secretly install the ransomware virus or other malware.
Phishing emails are becoming increasingly difficult to detect as cybercriminals find clever ways to make a malicious email look legitimate. This underscores the importance of security awareness training for everyone in the organization, not just the I.T. department.

Compromised Passwords

The ransomware operators may have used previously compromised passwords from employees at your organization to gain unauthorized access to the networks. This derives from the poor security practices of reusing the same passwords for multiple accounts and authentication processes.
If your employees have been using old & weak passwords to access your business data, a cyber criminal can use a previously compromised password to initiate the attack. Remember to always to follow good password hygiene.
The variety of attack vectors highlights the importance of a digital forensics investigation that can help victims understand how the ransomware came onto your computer and what steps you can take to remediate the vulnerability.

4 Options for Ransomware Recovery

In this section, we cover the options to restore files encrypted or locked by ransomware.

1. Recover files with a backup

If your files become encrypted in a ransomware attack, check to see if you have backups to restore and recover (in order).

2. Recreate the data

Even though your files are encrypted by ransomware, you might be able to recreate the data from a variety of sources as outlined below:

3. Breaking the ransomware encryption

The harsh truth is that the majority of ransomware encryption is unbreakable. This impossibility is a tough concept for many of us to accept, given the technological advances of our society.
Does this mean you should skip looking into whether the ransomware encryption can be broken? This option should always be explored if presented by a ransomware recovery firm, although the final choice is yours to make. We will lay out a real life example at Proven Data below to outline why this was a great decision for a company that was infected with ransomware.
While it tends to be rare, there are poorly constructed ransomware encryptions that have been broken by security researchers. If you can avoid paying a ransom, you should at all costs.
There can be flaws in the malware or weaknesses in the encryption. Businesses can look at these options, especially if time is on your side. There are also free ransomware decryption resources that provide tools for previously decrypted ransomware variants. A client of ours had hired a ransomware recovery company to recover their files until we discovered at the very last moment through our analysis that the encryption was breakable. With less than 20 minutes to spare, we saved the client out of paying a $450,000 ransom.

Why can’t most ransomware encryption be broken?

Ransomware is a cryptovirus, which means it uses cryptography in combination with malware to lock your files. Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. If strong encryption is used, it can take thousands, if not millions of years to break the encryption given the strength of today’s computers.
Encryption is a security tool created with the intent of data protection. It is a defensive tool to provide security, privacy, and authentication. Sadly, ransomware attackers are using it as a weapon against innocent victims.

How do I know if the encryption can be broken?

You can start off with this free ransomware identification resource to determine the feasibility of decryption. You will need to upload the ransom note and a sample file into the ID-Ransomware website, and it will tell you if there is a free decrypter or if it is an unknown ransomware variant. Please note that the tool is not always 100% accurate. If the variant is still under analysis, you will need a malware or encryption analyst to determine whether or not there is a possibility for decryption.
Encryption is designed to be unbreakable, which is why security researchers can’t simply make a tool for ransomware decryption. These unbreakable encryptions protect our bank accounts, trade secrets, government data, and mobile communications, among other things. It would be a significant security concern if there were a master decryption tool that could break encryption algorithms.

4. Paying the ransom to decrypt ransomware files

If the encryption is too strong, the only way to obtain the decryption key for your files is to pay the ransom. Many ransomware victims don’t have time on their side because they are facing significant business disruption. Each minute that passes could be a lost client, or worse for a medical organization.
Here is a list of the most prevalent ransomware variants that are known to be “cryptographically secure,” which means that Proven Data or the security community has confirmed the encryption is unbreakable:

I don’t want to pay the hackers ransom.

Businesses and individuals have the option of choosing not to pay the ransom in a ransomware attack to regain access to their files. For personal, political, or moral reasons, there has been resentment of the ransomware economy, and victims do not have to engage in extortion. If paying the ransom is the only option, you should know what to expect before considering moving forward.

How a ransomware recovery specialist can help

If you do decide to use a ransomware recovery company and if there is one thing you get out of this article, it is this: You should always question how a ransomware recovery company is recovering your data. If you are unsure, asking the right questions will ensure a transparent experience:
A ransomware recovery specialist can analyze your current situation and determine what options are available to you at the time of the inquiry. A competent and experienced ransomware recovery company should be able to provide the following:
Understanding how your files were affected by ransomware in the first place will provide you with the insight needed to prevent another attack. Whether you choose Proven Data or another company to decrypt your ransomware files, it’s important to know what unknowns there may be out there.
Our threat intelligence that we’ve gathered from the thousands of previous cases enable you to make informed decisions in helping restore your data after a ransomware attack. If you require a company with such experience, we’re standing by to assist 24/7.
submitted by Proven_Data to u/Proven_Data [link] [comments]

Small Business Just Hacked. [email protected] encryption asking for Ransom Bitcoin. Need Advice.

As a primer, longtime lurker but complete novice when it comes to hacking so thanks for your patience.
A few hours ago one of our employee's computers had a ransom note pop up on it and many of our network files started getting encrypted. The computer also had a window on it that looked similar to a command prompt that showed time updates (see image) and the amount of files encrypted every 5 minutes.
The hacker demanded bitcoin be sent to the email [email protected] and left a .txt file in every folder that read:
All your important files are encrypted! Any attempts to restore your files with the thrid-party software will be fatal for your files! RESTORE YOU DATA POSIBLE ONLY BUYING private key from us. There is only one way to get your files back: | 1. Download Tor browser - and install it. | 2. Open link in TOR browser - http://lockbitks2tvnmwk.onion/?81F3696546327500B4B15998DEEEE1D5 This link only works in Tor Browser! | 3. Follow the instructions on this page ### Attention! ### # Do not rename encrypted files. # Do not try to decrypt using third party software, it may cause permanent data loss. # Decryption of your files with the help of third parties may cause increased price(they add their fee to our). # Tor Browser may be blocked in your country or corporate network. Use or use Tor Browser over VPN. # Tor Browser user manual !!! We also download huge amount of your private data, including finance information, clients personal info, network diagrams, passwords and so on. Don't forget about GDPR.
Earlier today I opened up Remote Desktop from Windows Pro on her computer and configured port forwarding to her computer's IP. I also went into Windows Firewall on her computer and enabled all of the 'Remote Desktop' applications to bypass Firewall so the Remote Desktop would work properly. The employee whose computer was hacked was not working on her computer for about 5 hours leading up to the hack.
I guess my questions are:
  1. How can we track where this came from?
  2. Given she was not at her computer when this all happened, is this virus on a timer?
  3. How can we find out if other computers on our network are infect and will be on a timer as well?
  4. I am having a hard time believing that me opening up the computer to Remote Desktop is not somehow associated with the hack, but our IT admin insists it's not related. Could this have been the cause?
submitted by WIttyRemarkPlease to AskNetsec [link] [comments]

Trading, psychology, and the benefits of Trading Bots.

Trading, psychology, and the benefits of Trading Bots.
Most beginners who open trading accounts on cryptocurrency exchanges and start independent trading, see only one goal — to earn as quickly as possible.
This is a big mistake. The fact is that trading on the stock exchange will only become truly profitable when it becomes a priority for the person who came to trading. As a rule, to combine trade with any other occupation and at the same time everywhere to succeed will not work.
Trading for a novice trader should be if not the main, then a very important and priority occupation. No need to wait for quick results.
Trading on the stock exchange — the same profession as a doctor, Builder or engineer. The only difference is that she can’t go to University. Just as one learns to be a Builder for five years, so it takes years to learn all the wisdom and secrets of the trade. Trading on the stock exchange is not a Stayer distance, it is a marathon. And the winner is the one who will find the courage to reach the end.
In addition, trade is very much changing a person, showing his qualities, which in everyday life he does not know. Over time, if a trader really wants to succeed in trading, he must completely rethink his life, change the system of values and look at many things, change himself.

Fear as a Component of Trading

The strongest emotion known to man is, of course, fear. What gives rise to the exchange’s fears? We can not predict the behavior of the market, and therefore fully control their money invested in its instruments. In addition to the unknown, when there is no understanding of how to safely get out of a predicament, we are afraid in advance of what traumatized us earlier. Because fear is so emotional, you need to surround yourself with the right facts to drive it away. We need to know for sure that our trading system should not generate more than three consecutive losing trades. Winners plan what to do if their trades fail.
So only a systematic approach will protect us from ourselves. That is why the investment rules written in the trading templates exist not only to communicate the best market opportunities but, more importantly, to protect us from our own internal “demons”.

Emotions in Trading

Seekers of strong emotions, adrenaline forget everything in pursuit of excitement. It follows that a novice investor, overtaken by the “adrenaline curse”, will trade at the slightest opportunity. Yet Dostoevsky, one of the most famous and avid players, said that for him the most acute feeling in life — to win money. The second most acute feeling is to lose them.
Paradoxically, few things give more pleasure than getting rid of the pain and torment of being in a losing trade. This creates a mental internal conflict. Awareness of losses brings “excitement” or a sense of exaltation, and our emotionality does not care what we pay for these experiences losses in the brokerage account. “Adrenaline curse” will drive us into the trade for thrills and extract them from there, regardless of the price.

Intuition on the Exchange

The mind of an intuitive investor tries to construct mental constructions of events. I will try to explain what mental construction is by the example of a chess player’s thinking. The grandmaster understands and remembers the position of each figure in terms of its mental constructions and relationships inherent in the arrangement of figures. The random arrangement of the figures does not fit into any of his mental constructs, and he cannot structure what he sees.
Market patterns on cryptocurrency charts compared to chess compositions include an excessive element of chaos so that they can be interpreted intuitively. Investors with intuition are able to achieve success with the help of” flair”, but this flair often leaves them. The intellect of the rational trader, on the contrary, is manifested in his ability to logically comprehend what is happening to him and to the reality around him and to make on this basis the simplest and most correct decision. Intuition is the ability of a person to penetrate into the essence of things not by reasoning or logical thinking, but by instantaneous, unconscious insight. This is the ability of a trader to “ see the market not with his mind but with his heart.” But, even with a highly developed intuition, you can not act on the market, using only it.This is the trap of intuitive trading — it is impossible to learn.

Fear of Taking Responsibility

What distinguishes successful traders from losers who lose money? First of all look at life. Most people are very passive.
If you ask people if they are happy with their lives, the answer is likely to be negative. On the question of who is to blame, I would say that the fault of the parents who have not given a good education, why now not get a good job; blame the employer who delays wages; blame the dollar, which is rising, then falling; to blame the President and the government who do not pay pensions, etc., In their troubles and problems most of the people blame anyone but themselves.
The same thing happens in the market because the exchange is a mirror of our life. Talk to the trader losing money, ask why he can’t make money in the market. He replied that the fault of the insiders, manipulators, blame the binary options broker too much Commission, to blame the neighbor who suggested the deal, which turned into a heavy loss. In other words, he himself would have been a millionaire long ago, but for a number of reasons, certainly beyond his control, until that happened.
If a person wants to achieve something-not just to lead a life, which are millions of ordinary people (every day to go to work, save five years for a car, twenty years for an apartment, etc.), and to live a full life, so that the financial issue went into the background, to work for fun, not for money, he needs to take responsibility for everything that happens in his life. A person needs to realize that the cause of everything that happens to him is himself.It is this view that allows you to succeed in life and in any business. And trade is no exception.
This is the way successful traders look at life. Once you realize that the cause of all your losses is yourself, and not some mythical manipulators, then the case will move forward.
In the age of digital technologies, when artificial intelligence develops, computer technologies improve, mankind creates various tools to facilitate their own life and everyday life.
If we pay attention to trading, then this direction is actively developing, getting new and unique tools. Since any trader (beginner or experienced specialist) is subject to emotions and various psychological factors, there are tools such as trading bots.

Trading Bots/Robots

A trading robot (bot) is a program that has a certain algorithm. It buys or sells cryptocurrency assets, focusing on the situation in the market. The first trading robots appeared in 2012, and since then they have become more and more perfect. Currently, according to some estimates, 90% of short-term transactions are made either by bots or with their participation.
Bots are usually developed for specific trading platforms. Most cryptocurrency exchanges have an API, and they are generally positive about free auto trading within their platform.
In contrast to the positive attitude to exchange robots, exchanges often have a negative attitude to arbitration robots. On the rules of trade can be found in the official documentation of the exchange, and if there is no such information, the question can be asked directly to technical support.Some people wonder: is it possible to write your bot trader? This is not an easy option, which is suitable only for experienced programmers. After writing, bots are tested for a long time in the market, corrected numerous errors, corrected strategy.
A programmer can also write a bot based on someone else’s code. Some bots are open source, and anyone can find it on GitHub and modify it to fit their needs.
Buy a bot for trading cryptocurrency: there are inexpensive programs for trading (about $ 10), and the cost of more high-quality and complex exceeds more than $ 200 and even $ 1000. There is no maximum price limit for bots, top bots are written to order $ 1500 and more.
Users are usually offered a choice of several tariff plans for crypto bots, from economy to luxury. The inexpensive option includes the most basic trading algorithms, and the expensive one brings maximum profit and works on more complex algorithms. Arbitration bots are a more expensive exchange. Known cases when downloading the bot, people got on your computer virus-miner or virus-cipher, which encrypt all your personal files and demanded a ransom in bitcoin, usually in bitcoin. Naturally, after transferring the ransom to the specified wallet, no decryption of the files occurred.
Trading strategy of stock and arbitrage bots can be very simple, for example:- When the price of cryptocurrency decreases, you need to buy it.- If the price rises, it should be sold.- Or much more complicated. The algorithm can take into account historical data for the last time, indicators, navigate by signals. Quality bots analyze more than a hundred parameters when placing orders.
Some programs do not change the algorithm, and there are bots that can connect or configure additional parameters. This option is well suited for experienced traders who have their own preferences in the style of trading.
A standard bot can perform such actions:- To assess the market situation, to monitor the rate at a given period of time, to make a forecast. In manual trading, it can show signals to the trader.- Create buy or sell orders.- To report on the profit or loss received.
On the example of our IMBA-Exchange, we came to the conclusion that we also need to provide an opportunity for each trader to use bots so that they can be in a comfortable trading environment.
Our exchange specialists are developing their own bot for cryptocurrency trading, which will be an excellent and convenient addition to every trader who wants to eliminate the psychological factor and seeks to get stable earnings without losing personal time.
IMBA-Exchange Metronix bot makes life easier for every investor.
For example, Ing. Michael Eder the CEO of IMBA-Exchange, who has 10 years of experience in trading and the last 3 years in cryptocurrency trading, has firmly decided for himself that in the current realities trading on the exchange simply needs bots:
Throughout the time that I have been trading, I can confidently say that today trading bots are necessary for all traders as the main tool. No matter how long you are in exchange trading, but the nature of the person is designed so that under the influence of psychological factors, market conditions, etc. You still make mistakes and, as a result, this leads to financial losses.Our Metronix Trading Bot will help to solve these problems and eliminate negative consequences. A bot is a tool; it has no feelings. He performs a specific task for a given program and performs it almost unmistakably. The task of the trader is to monitor the situation on the market and correctly, as well as at the right time to configure your bot.
Stay with us, in front of you will find many interesting and new.
Material developed by experts IMBA-Exchange
submitted by IMBA-Exchange to u/IMBA-Exchange [link] [comments]

CryptoWall 3.0 Question

One of the VPs in my office has recently been hit by CryptoWall and hasn't been backing up his laptop. Despite the protest of the IT department and the recommendation that we simply wipe the computer and start over he is insistent on not losing work and personal information. In his mind the $500 is well worth this information. He is going to pay for this out of pocket and do it all himself. Basically I can't stop him.
At this point my question is. Has anyone here paid the ransom or know someone that has paid the ransom and successfully recovered their data? If that is the case have you seen any instances of that data containing the encryption software that will re-run itself at a later time?
Either way he is going to put the data on an external hard drive if the decryption is successful and leave it there until I can get to it. I will also be wiping the laptop completely on Monday and putting a fresh image on it. He also knows not to put the old data anywhere near the network. Luckily none of this got past his laptop and into the server.
P.S. I am 100% against paying the ransom but this is completely out of my control. He is much higher up than I am and it is not worth an argument. I'm happy enough to let him do his thing as long as the laptop is no longer on or near my network. So please no lectures on talking him out of this.
submitted by zztr to sysadmin [link] [comments]

Proper Care & Feeding of your CryptoLocker Infection: A rundown on what we know.

This article is no longer being maintained, please see the new version here. Thanks.
tl;dr: I hope you have backups. It's legit, it really encrypts. It can jump across mapped network drives and encrypt anything with write access, and infection isn't dependent on being a local admin or UAC state. Most antiviruses do not catch it until the damage is done. The timer is real and your opportunity to pay them goes away when it lapses. You can pay them with a GreenDot MoneyPak or 2 Bitcoins, attempt to restore a previous version using ShadowExplorer, go to a backup, or be SOL.
Vectors: In order of likelihood, the vectors of infection have been:
  • Email attachments: A commonly reported subject is Payroll Report. The attachment, most of the time, is a zip with a PDF inside, which is actually an executable.
  • PCs that are unwitting members of the Zeus botnet have had the virus pushed to them directly.
  • There is currently one report of an infection through Java, using the .jnlp file as a dropper to load the executable.
Variants: The current variant demands $300 via GreenDot MoneyPak or 2 BTC. I will not attempt to thoroughly monitor the price of bitcoins for this thread, use Mt. Gox for the current exchange rate. Currently the MoneyPak is the cheaper option, but last week Bitcoins were. Two variants, including a $100 variant and a $300 that did not offer Bitcoin, are defunct.
Payload: The virus stores a public RSA 2048-bit key in the local registry, and goes to a C&C server for a private key which is never stored. The technical nuts and bolts have been covered by Fabian from Emsisoft here. It will use a mix of RSA 2048-bit and AES 256-bit encryption on files matching these masks:
*.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.eps, *.ai, *.indd, *.cdr, ????????.jpg, ????????.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c, *.pdf, *.tif
This list of file masks may be incomplete. Trust this list at your peril. When in doubt, CryptoLocker will show you what files it has encrypted by clicking the relevant link in the virus's message.
It will access mapped network drives that the current user has write access to and encrypt those. It will not attack server shares, only mapped drives. Current reports are unclear as to how much permission is needed for the virus to encrypt a mapped drive, and if you have clarification or can test in a VM please notify me via message.
By the time the notification pops up, it's already encrypted everything. It's silent until the job is done.
Many antiviruses have been reported as not catching the virus until it's too late, including MSE, Trend Micro WFBS, Eset, GFI Vipre, and Kaspersky. They can further complicate matters by reverting registry changes and removing the executables, leaving the files behind without a public or private key. Releasing the files from quarantine does work, as does releasing the registry keys added and downloading another sample of the virus.
Windows XP through 8 have all reported infections.
What's notable about this virus, and this is going to lead to a lot of tough decisions, is that paying them to decrypt the files actually does work, so long as their C&C server is up. They verify the money transfer manually and then push a notification for the infected machine to call home for the private key again, which it uses to decrypt. It takes a long time to decrypt, at the rate of roughly 5GB/hr based on forum reports. The virus uses the registry to maintain a list of files and paths, so not moving the files around is vital to decryption if you are paying them.
Also notable is that the timer it gives you to pay them does appear to be legitimate, as multiple users have reported that once the timer ran out, the program uninstalled itself. Reinfecting the machine does not bring a new timer. I was not able to verify the uninstallation of the program after the timer ran out, it appears to be dependent on internet access.
Due to the nature of the encryption, brute-forcing a decrypt is essentially impossible for now.
Removal: Removing the virus itself is trivial, but no antivirus product (or any product, for that matter), will be able to decrypt the files until the private key is found.
File Recovery: There are only a handful of options for recovering encrypted files, and they all rely on either having System Restore/VSS turned on or having a backup disconnected from the infected machine. Cloud backup solutions without versioning are no good against this as they will commit the encrypted files to the cloud.
I had a Carbonite employee message me regarding my earlier statement that Carbonite is no good against this virus. It turns out that versioning is included in all Carbonite plans and support all agent OSes except Mac OS X which is outside the scope of this thread anyway. They have the ability to do a mass reversion of files, but you must call tech support and upon mentioning CryptoLocker you will be escalated to a tier 3 tech. They do not mention this ability on the site due to the potential for damage a mass reversion could do if done inadvertently. These are my own findings, independent of what the employee told me. Crashplan and other versioning-based backup solutions such as SonicWALL CDP should also work fine provided the backups are running normally.
Using the "Previous Versions" tab of the file properties is a cheap test, and has had mixed results. Using ShadowExplorer on Vista-8 will give you a much easier graphical frontend for restoring large amounts of files at once (though this will not help with mapped drives, you'd need to run it on the server in that case). Undelete software doesn't work as it encrypts the files in place on the hard drive, there is no copying going on. The big takeaway is that cold-storage backups are good, and they will make this whole process laughably easy to resolve.
Prevention: As this post has attracted many home users, I'll put at the top that MalwareBytes Pro, Avast! Free and Avast! Pro (defs 131016-0 16.10.2013 or later) will prevent the virus from running.
For sysadmins in a domain environment, one way to prevent this and many other viruses is to set up software restriction policies (SRPs) to disallow the executing of .exe files from AppData/Roaming. Grinler explains how to set up the policy here.
Visual example. The rule covering %AppData%\*\*.exe is necessary for the current variant. The SRP will apply to domain admins after either the GP timer hits or a reboot, gpupdate /force does not enforce it immediately. There is almost no collateral damage to the SRP. Dropbox and Chrome are not effected. Spotify may be affected, not sure. I don't use it.
Making shares read-only will mitigate the risk of having sensitive data on the server encrypted.
Forecast: The reports of infections have risen from ~1,300 google results for cryptolocker to over 150,000 in a month. This virus is really ugly, really efficient, and really hard to stop until it's too late. It's also very successful in getting people to pay, which funds the creation of a new variant that plugs what few holes have been found. I don't like where this is headed.
Some edits below are now redundant, but many contain useful information.
9/17 EDIT: All 9/17 edits are now covered under Prevention.
10/10 EDIT: Google matches for CryptoLocker are up 40% in the last week, and I'm getting 5-10 new posts a day on this thread, so I thought I'd update it with some interesting finds from fellow Redditors.
  • soulscore reports that setting the BIOS clock back in time added time to his cryptolocker ransom. Confirmed that the timer extends with the machine offline, but that may be cosmetic and I don't like your chances of this actually helping if your timer runs out on the server side.
  • Spinal33 reports that AV companies are catching up with CryptoLocker and are blocking websites that are spawned in the virus's domain generation algorithm. This effectively means that some people are locked out of the ability to even pay the ransom. (Technically they could, but the virus couldn't call home.)
  • Malwarebytes is claiming that MBAM Pro will catch CryptoLocker. If someone wants to test them on it, be my guest. Confirmed
  • CANT_ARGUE_DAT_LOGIC gave some insight on the method the virus uses when choosing what to infect. It simply goes through folders alphabetically and encrypts all files that match the filemasks towards the top of this post. If you are lucky enough to catch it in the act of encrypting and pull the network connection, the CryptoLocker message will pop up immediately and the countdown will begin. Helpful in determining what will need to be taken into account for decryption.
EDIT 2: We had a customer that ignored our warning email get infected so I will have my hands on an infected PC today, hope to have some useful info to bring back.
10/10 MEGA EDIT: I now have an active CryptoLocker specimen on my bench. I want to run down some things I've found:
  • On WinXP at least, the nested SRP rule is necessary to prevent infection. The path rule needs to be %AppData%\*\*.exe
  • An alternate link to the virus sample is
  • Once the program runs it spawns two more executables with random names in %userprofile%. Adding a SRP to cover %userprofile%\*.exe may be desired, though this will prevent GoToMyPC from running at a bare minimum.
  • This user was a local administrator, and CryptoLocker was able to encrypt files in other user's directories, though it did not spawn the executables anywhere but the user that triggered the infection. When logged in under a different account there is no indication that a timer is running.
  • The environment has server shares but no mapped drives and the shared data was not touched, even though a desktop shortcut would've taken the virus to a share. I suspect that will be covered in the next iteration.
  • The list of masks above does not appear to be totally complete. PDF files were encrypted and were not originally part of the set of file masks. That is the only exception I noticed, everything else follows the list. Conveniently (/s), CryptoLocker has a button you can click that shows the list of files it's encrypted.
  • The current ransom is $300 by MoneyPak or 2BTC, which at the time of writing would be $280 and change.
  • Fabian reported that registry data is stored at HKCU/Software/CryptoLocker. I cannot glean the meaning of the DWORD values on files but I do notice they are unique, likely salts for the individual files. I'm curious what purpose that would serve if the private key was revealed as the salts would be useless.
  • I have confirmed the message soulscore left that setting the BIOS timer back a few hours adds an equal amount of time. No telling whether that will work once it has a network connection and can see the C&C server, though.
  • The virus walked right through an up-to-date version of GFI Vipre. It appears AV companies either consider the risk too low to update definitions or, more likely, they're having trouble creating heuristic patterns that don't cause a lot of collateral damage.
10/11 EDIT: I ran Daphne on the infected PC to get a better idea of what might be going on. lsass.exe is running like crazy. Computer's had it's CPU pegged all day. I noticed the primary executable running from %AppData% has a switch on the end of the run command, which in my case is /w000000EC. No idea what that means.
10/15 EDIT: I just wanted to thank all the redditors that have submitted information on this. I have some interesting new developments that I'll be editing in full tomorrow.
10/18 EDIT: Hello arstechnica! Please read through comments before posting a question as there's a very good chance it's been answered.
New developments since 10/15:
  • We have confirmation that both Malwarebytes Antimalware Pro and Avast Free and Pro will stop CryptoLocker from running. My personal choice of the two is MBAM Pro but research on your own, AV Comparatives is a wonderful resource.
  • We have reports of a new vector of infection, Java. This is hardly surprising as Zeus was already being transmitted in this fashion, but Maybe_Forged reports contracting the virus with a honeypot VM in this manner.
  • zfs_balla made a hell of a first post on reddit, giving us a lot of insight to the behavior of the decryption process, and answered a frequently-asked question. I'm paraphrasing below.
A file encrypted twice and decrypted once is still garbage.
The waiting for payment confirmation screen stayed up for 16 days before a decryption began, so don't lose hope if it's been up a while.
The DWORD values in the registry have no bearing on decryption. Renaming an encrypted file to one on the list in the registry will decrypt it. However, I would presume this would only work for files that the virus encrypted on that machine as the public key is different with every infection.
Adding any new matching files to somewhere the virus has access will cause them to be encrypted, even at the "waiting for payment confirmation" screen. Be careful.
Hitting "Cancel" on a file that can't be found doesn't cancel the entire decryption, just that file.
EDIT 2: I've rewritten the bulk of this post so people don't have to slog through edits for important information.
10/21 EDIT: Two noteworthy edits. One is regarding Carbonite, which is apparently a viable backup option for this, it is covered under File Recovery. The other is regarding a piece of software called CryptoPrevent. I have not tried it, but according to the developer's website it blocks %localappdata%\*.exe and %localappdata%\*\*.exe which is not necessary for the current variant and will inflict quite a bit of collateral damage. I have no reason right now to doubt the legitimacy of the program, but be aware of the tradeoffs going in.
I'm now at the 15000 character limit. Wat do?
submitted by bluesoul to sysadmin [link] [comments]

Cryptolocker Encrypted Files, 90 Hours left and 0.5 Bitcoin ($134) fee requested. HELP!

Windows 7 Home Premium Manufacturer: iBUYPOWER Computers Processor: Intel(R) Core(TM) i7-4790 CPU @ 3.60GHz RAM: 16.0 GB Hard Drive: 1 TB
I don't have the rest of the specs on hand but please consider this request anyways, for I am in desperate need of help.
Here is a picture of what my computer desktop looks like now. A trojan virus called Cryptolocker apparently got installed on my computer, and has already encrypted most of my files and is asking for 0.5 bitcoins as ransom. It's got a timer, and is currently at around 90 hours left, so please hurry. I looked online already as to what options I have, but found that the few options I have are either unavailable, such as a system restore (due to the fact that my system doesn't have a saved restore point), or are too tedious, such as getting a personal key to decrypt each file (there are thousands). If anyone can help me that would be great, because I would really rather not pay the fee of course.
Thank you for your time,
submitted by tdawgthefirst to techsupport [link] [comments]

Need to buy .2 BTC immediately with either paypal or credit card

I am currently faced with the option of paying ransomware for a crypto virus. Ive exceeded all other options, the best choice ive gotten is to pay the ransom because to pay for decryption through a legitamite company would cost approx 11k usd and to pay ransom will cost about 2500k usd. Right now there are limits on all the bitcoin purchasing sites that are either 250$ or they wont approve my id because theres high volume of traffic. Is there any recommendations on where i could buy this?
submitted by xpenguinxninjax to Bitcoin [link] [comments]

TIFU by clicking on a UAC popup

This is a crosspost from Tales from Tech Support as well.
So, this story comes to you from the users perspective. As the user, I feel it is important to clarify two points: I'm not in tech support, I actually just work in a retail job. I am, however, pursuing a degree in Computer Science with a minor in IT, and I've been using computers since the days before I could actually read.
Now, for those of you who are unaware, whether because you've never dealt with a cryptovirus, or because you simply come here for the stories and may not be the most technically minded - I dunno, trying to be inclusive here - cryptoviruses encrypt your hard drive with a very strong method of encryption. They will frequently request a ransom for the key to decrypt the files, and give a time limit.
At work, we use two Windows 7 registers with a POS system installed on them. These systems were purchased from a vendor as units, and the entire setup uses the primary POS as a server and any other POS, in our case the only other system, as a slave. It just so happens that the server register is the one that my manager prefers to use. This is also the computer which backups are taken from one an external hard drive.
Which is left plugged in at all times.
At some point yesterday, my manager was attempting to look up some information regarding his grandfather. After finishing up with that, he apparently received a popup attempting to get him to allow an action under UAC. Unable to close it, he simply hit no several times, and then left it alone.
Smart man.
Along I come, unaware of this, using the register to sell people their preferred goods, and I see this window. It is dragged to the bottom of the screen, but remains on top of the windows. It is branded as a UAC window, with admin shield and every trimming.
Now, I've been using Windows 7 since it came out. I used Vista prior to it. I am well acquainted with UAC. UAC has several properties which are important to the next ten seconds of action: it darkens the screen, it remains smack dab in the middle of the screen, and it removes all other windows from the screen while you deal with it. These are the hallmarks of a UAC window.
/TIFU, I did something stupid here. Very stupid. I became the user. I read the prompt. It discussed a .dll and Windows. I assumed all was well. I did not think about the three hallmarks of the UAC prompt. I did not consider that our anti-virus had not been reupped and I did not even think to fight for an alternative to be installed when I discovered that it was not active. I didn't think.
And so, as a user does, I pressed yes.
/TIFU, cryptoviruses don't usually stop your computer from working. They don't usually really do much of note, at first. This one was not an exception to that trend. The POS system was working. I could still ring people out, no problems there.
But the background of the computer changed. No longer was it the blue kind of artsy background of Windows 7. Now, it was black. With white text. Telling me that, if I don't understand English, Google Translate was there to help. That my computer was now encrypted with an RSA-4096 key. That I could pay the ransom in Bitcoin, using an Onion network browser. That I just fucked up.
I immediately called my manager, let him know what happened. He came in, on a busy Saturday night, having already worked ten hours. We set about discovering the damage. While these viruses can't encrypt files currently loaded into RAM, and therefore the POS system and database were probably fine, we printed off our entire stock list, which thankfully is small due to the sector we're in, as well as which items were related to which vendor.
I went ahead and installed another anti-virus solution, the one I use at home, and it discovered one file which was a trojan, ironically in one of the .exe files for the POS software we have installed.
One more thing. For those of you who may have found your hand moving at high speed to your face upon reading the words "which is left plugged in at all times," you will not be forgotten. While I wasn't able to verify whether the virus had gotten the backup drive, it was disconnected.
Not quite sure how exactly this will affect the store from here, but it looks like it could have been worse.
And that, kids, is why we don't click popups masquerading as Windows popups.
TL;DR Stupid employee clicks Trojan Horse popup. Encrypts hard drive for ultimate security.
submitted by Pfheonix to tifu [link] [comments]

CryptoLocker Battle #1 - The Screwed Client

This will be my last post with a disclaimer of what type of IT we handle, and what stories to expect from me.
We are an IT consulting / Computer repair company servicing small business (~1-25 employees), and residential market. I will try to focus my stories on battles, insane clients, billing issues, whatever seems to stand out to me. I won't have many of the stupid user stories. I love them just as much as the next person, but honestly, we see this every day. I can't stress enough how many service calls we go on a regular basis where the power cord is unplugged, or they are doing other stupid stuff. It honestly doesn't faze me, and they don't really stand out in my memory. We do about ~20 service calls a day, so it takes something really interesting to stand out to me. That being said, here is an interesting battle against CryptoLocker. This story took place about 3 months after CryptoLocker first came about.
The Screwed Client - They are a design and print company. They aren't the type of company that just designs and sends the jobs off to Vistaprint or some online printer. They are a serious printing company with real printers doing the actual work. In a smaller city like mine, that is a rarity. I mean you can go to any Kinkos to get copies made, but if you need 50,000 business cards, even Kinkos will send the job out to a Vistaprint or the like. These guys will handle it. Hell they will even hand deliver it to your door(and I don't mean shipped!). They design quite a bit of their print jobs. They store pretty much everything that they have ever designed, and have regular customers who call in to have their usual order printed.
This is a really new client to us. Their previous IT consultants were rather crap, and they decided to try us out after having a virus on one computer. We fixed it and talked with the owner about setting up a meeting where we can go over a list of things we recommend they do. Upgrade to Gigabit routers/switches, backups, etc. He was going to be on vacation for a few weeks, but agreed to sort it when he got back.... Unfortunately, by then it would be far too late!
Fast forward 1 week. We get a call that their design computer had a random virus on it, so we send out a technician. When he gets there about 1-2 hours later, the designer boasted how they were able to remove the virus themselves, and they were quite proud of this. They found the tools online, and removed it quickly. He did mention though that designs he tried to open weren't working. Red Flag.
Our tech checks it out, finds out that every design(pdf, psp, psd, etc), every document, every frickin user file of use is encrypted. These files are located on their server. A typical network shared drive is how they are setup. Tech asks client what encryption software he is using, and he says he isn't. Bigger Red Flag. Tech digs deeper, checks the logs of the anti-virus/malware software the designer ran to remove it. He finds some virus files he hasn't really seen before(none of us had at this point) that were removed. To the Oracle! He googles the name, and finds out it is the worst virus in the known world... A name that most of us in the biz won't forget... CryptoLocker.
Reads up on it, finds the gory details about how it uses an incredibly secure encryption method, literally can't be decrypted without paying the ransom. Their ransom? 2 BTC. The bitcoin prices were something like $700-900 back then. The damn virus didn't just encrypt the local files on the designers HDD, it encrypted their network shared folder. The entire folder. Tech googles around some more to find any backdoors. Finds out that if you have shadow copies enabled, then you can revert to previous saves and be ok. Unfortunately, it wasn't enabled, and so it isn't ok.
Now the hard part; informing the boss.
Our technician calls the boss up to explain the situation. Asks him if there are any backup systems in place, and about how much the ransom is. The boss explains how they have no backups in place. Ooof. Nothing, nada. After some more conversation, the boss OK's paying the ransom. In a city like ours, most people and businesses don't have a lot of free cash laying around. We aren't like Detroit bad, but my point remains.
Technician goes about finding the website where you find details on how to pay the ransom. There is a nice box, asking for a decryption key. Tech starts looking around to find any traces of where the key is stored. After examining the now gone virus files/folders, he googles to find where the decryption key is stored. It is stored in the virus files.... The same ones the designer deleted. After some more research, he finds out that there is no way to decrypt the files without providing the key. And if the key is deleted/destroyed, the data is absolutely worthless....
The client is now completely and utterly screwed.
Boss wasn't happy, designer was even less happy. I do believe some designs were recovered from past emails, but the bulk was gone with no way to get it back.
The moral of the story? BACK UP YOUR DATA.
Don't put it off til after vacation, don't wait until you have a near disaster, don't wait until next paycheck. Do it. You won't regret it, that one friggin time you will need it.
We finished the removal of any remnants that were left of other malware/viruses we found, cleaned up the data folders, and installed anti-virus software on the server(it was lacking it, previous IT company FAIL).
It took all of 0.01 seconds for the boss to approve of spending money to install a backup system. We installed the software that day, got it up and running right away. They have been a happy client of ours ever since, even though on that day, they got screwed by CryptoLocker.
submitted by Syron4 to talesfromtechsupport [link] [comments]

IT Expertise desperately needed. Crypto-Ransomware on company server. Please help.

Hello, Redditors, I'm here today on the behalf of my company and I must say we are indeed in a terrible, terrible situation. Over this weekend a computer within our network was infected with a type of crypto-ransomware called Osiris. This spread from the client computer onto our server that hosts Epicor and it's database. The database does not have a backup. Yes, that is correct. There is no backup for this server. I'm fairly new to the company but I have been tasked with solving this situation as efficiently as possible to get operations running. It just so happens that this server was responsible for inventory control, purchasing, and production management. I have tried looking online for decrypters for Osiris as well as scanning with pretty much any antivirus suite available including Bitdefender, Kaspersky, Hitman Pro, Malware Bytes, and Spyhunter but all to no avail. The antivirus suites found something called an "encryption engine" hiding behind a Trojan but removing the infected files did not help as the remaining hard drive files are still encrypted. The Osiris virus has encrypted the server and client computer with a bunch of files with the .osiris file extension. It says to connect to their "private server" via Tor to send them a payment via bitcoin for the decryption key. Obviously paying the ransom is a stupid idea but quite honestly, we're looking to complete data loss for the company. Please advise reddit.
submitted by theriju to InformationTechnology [link] [comments]

10 Most Dangerous Viruses in Internet History.

Getting a computer virus has happened to many users in some fashion or another. To most, it is simply a mild inconvenience, requiring a cleanup and then installing that antivirus program that you’ve been meaning to install but never got around to. But in other cases, it can be a complete disaster, with your computer turning into a very expensive brick which which no amount of antivirus can protect.
In this list, we will highlight some of the worst and notorious computer viruses that have caused a lot of damage in real life. And since people usually equate general malware like worms and trojan horses as viruses, we’re including them as well. These malware have caused tremendous harm, amounting to billions of dollars and disrupting critical real life infrastructure. Here are the 10 most famous and malicious computer viruses.
Recommended Reading: 10 Signs Your PC Has Been Compromised


The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it’s not hard to see why. The virus managed to wreck havoc on computer systems all over the world, causing damages totaling in at an estimateof $10 billion. 10% of the world’s Internet-connected computers were believed to have been infected. It was so bad that governments and large corporations took their mailing system offline to prevent infection.
📷via BBC
The virus was created by two Filipino programers, Reonel Ramones and Onel de Guzman. What it did was use social engineering to get people to click on the attachment; in this case, a love confession. The attachment was actually a script that poses as a TXT file, due to Windows at the time hiding the actual extension of the file. Once clicked, it will send itself to everyone in the user’s mailing list and proceed to overwrite files with itself, making the computer unbootable. The two were never charged, as there were no laws about malware. This led to the enactment of the E-Commerce Law to address the problem.

2. Code Red

Code Red first surfaced on 2001 and was discovered by two eEye Digital Security employees. It was named Code Red because the the pair were drinking Code Red Mountain Dew at the time of discovery. The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system. It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes. Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources.
📷via F-Secure
It will then launch a denial of service attack on several IP address, famous among them the website of the White House. It also allows backdoor access to the server, allowing for remote access to the machine. The most memorable symptom is the message it leaves behind on affected web pages, "Hacked By Chinese!", which has become a meme itself. A patch was later released and it was estimate that it caused $2 billion in lost productivity. A total of 1-2 million servers were affected, which is amazing when you consider there were 6 million IIS servers at the time.

3. Melissa

Named after an exotic dancer from Florida, it was created by David L. Smith in 1999. It started as an infected Word document that was posted up on the usenet group, claiming to be a list of passwords for pornographic sites. This got people curious and when it was downloaded and opened, it would trigger the macro inside and unleash its payload. The virus will mail itself to the top 50 people in the user’s email address book and this caused an increase of email traffic, disrupting the email services of governments and corporations. It also sometimes corrupted documents by inserting a Simpsons reference into them.
📷via MSN Canada
Smith was eventually caught when they traced the Word document to him. The file was uploaded using a stolen AOL account and with their help, law enforcement was able to arrest him less than a week since the outbreak began.He cooperated with the FBI in capturing other virus creators, famous among them the creator of the Anna Kournikova virus. For his cooperation, he served only 20 months and paid a fine of $5000 of his 10 year sentence. The virus reportedly caused $80 million in damages.

4. Sasser

A Windows worm first discovered in 2004, it was created by computer science student Sven Jaschan, who also created the Netsky worm. While the payload itself may be seen as simply annoying (it slows down and crashes the computer, while making it hard to reset without cutting the power), the effects were incredibly disruptive, with millions of computers being infected, and important, critical infrastructure affected. The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS), which controls the security policy of local accounts causing crashes to the computer. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically.
📷via HP
The effects of the virus were widespread as while the exploit was already patched, many computers haven’t updated. This led to more than a million infections, taking out critical infrastructures, such as airlines, news agencies, public transportation, hospitals, public transport, etc. Overall, the damage was estimated to have cost $18 billion. Jaschen was tried as a minor and received a 21 month suspended sentence.

5. Zeus

Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing. The majority of computers were infected either through drive-by downloads or phishing scams. First identified in 2009, it managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.
In the US alone, it was estimated that more than 1 million computers were infected, with 25% in the US. The entire operation was sophisticated, involving people from around the world to act as money mules to smuggle and transfer cash to the ringleaders in Eastern Europe. About $70 million were stolen and in possession of the ring. 100 people were arrested in connection of the operation. In late 2010, the creator of Zeus announced his retirement but many experts believe this to be false.

6. Conficker

Also known as Downup or Downadup, Conficker is a worm of unknown authorship for Windows that made its first appearance in 2008. The name comes form the English word, configure and a German pejorative.It infects computers using flaws in the OS to create a botnet. The malware was able to infect more than 9 millions computers all around the world, affecting governments, businesses and individuals. It was one of the largest known worm infections to ever surface causing an estimate damage of $9 billion.
📷via Wikipedia
The worm works by exploiting a network service vulnerability that was present and unpatched in Windows. Once infected, the worm will then reset account lockout policies, block access to Windows update and antivirus sites, turn off certain services and lock out user accounts among many. Then, it proceeds to install software that will turn the computer into a botnet slaveand scareware to scam money off the user. Microsoft later provided a fix and patch with many antivirus vendors providing updates to their definitions.

7. Stuxnet

Believed to have been created by the Israeli Defence Force together with the American Government, Stuxnet is an example of a virus created for the purpose of cyberwarfare, as it was intended to disrupt the nuclear efforts of the Iranians. It was estimated that Stuxnet has managed to ruin one fifth of Iran’s nuclear centrifuges and that nearly 60% of infections were concentrated in Iran.
📷via IEEE
The computer worm was designed to attack industrial Programmable Logic Controllers (PLC), which allows for automation of processes in machinery. It specifically aimed at those created by Siemens and was spread through infected USB drives. If the infected computer didn’t contain Siemens software, it would lay dormant and infect others in a limited fashion as to not give itself away. If the software is there, it will then proceed to alter the speed of the machinery, causing it to tear apart. Siemens eventually found a way to remove the malware from their software.

8. Mydoom

Surfacing in 2004, Mydoom was a worm for Windows that became one of the fastest spreading email worm since ILOVEYOU. The author is unknown and it is believed that the creator was paid to create it since it contains the text message, “andy; I’m just doing my job, nothing personal, sorry,”. It was named by McAfee employee Craig Schmugar, one of the people who had originally discovered it. ‘mydom’ was a line of text in the program’s code (my domain) and sensing this was going to be big, added ‘doom’ into it.
The worm spreads itself by appearing as an email transmission error and contains an attachment of itself. Once executed, it will send itself to email addresses that are in a user’s address book and copies itself to any P2P program’s folder to propagate itself through that network. The payload itself is twofold: first it opens up a backdoor to allow remote access and second it launches a denial of service attack on the controversial SCO Group. It was believed that the worm was created to disrupt SCO due to conflict over ownership of some Linux code. It caused an estimate of $38.5 billion in damages and the worm is still active in some form today.

9. CryptoLocker

CryptoLocker is a form of Trojan horse ransomware targeted at computers running Windows. It uses several methods to spread itself, such as email, and once a computer is infected, it will proceed to encrypt certain files on the hard drive and any mounted storage connected to it with RSA public key cryptography. While it is easy enough to remove the malware from the computer, the files will still remain encrypted. The only way to unlock the files is to pay a ransom by a deadline. If the deadline is not met, the ransom will increase significantly or the decryption keys deleted. The ransom usually amount to $400 in prepaid cash or bitcoin.
The ransom operation was eventually stopped when law enforcement agencies and security companies managed to take control part of the botnet operating CryptoLocker and Zeus. Evgeniy Bogachev, the ring leader, was charged and the encryption keys were released to the affected computers. From data collected from the raid, the number of infections is estimated to be 500,000, with the number of those who paid the ransom to be at 1.3%, amounting to $3 million.

10. Flashback

Though not as damaging as the rest of the malware on this list, this is one of the few Mac malware to have gain notoriety as it showed that Macs are not immune. The Trojan was first discovered in 2011 by antivirus company Intego as a fake Flash install. In its newer incarnation, a user simply needs to have Java enabled (which is likely the majority of us). It propagates itself by using compromised websites containing JavaScript code that will download the payload. Once installed, the Mac becomes part of a botnet of other infected Macs.
📷via CNET
The good news is that if it is infected, it is simply localized to that specific user’s account. The bad news is that more than 600,000 Macs were infected, including 274 Macs in the Cupertino area, the headquarters of Apple. Oracle published a fix for the exploit with Apple releasing an update to remove Flashback from people’s Mac. It is still out in the wild, with an estimate of 22,000 Macs still infected as of 2014.
submitted by bogdan9409 to u/bogdan9409 [link] [comments]


According to a statement from the city, its computers are "currently experiencing outages on various internal and customer facing applications, including some applications that customers use to pay bills or access court-related information.
According to the FBI, the bureau is aware of the situation and is "coordinating with the city of Atlanta to determine what happened."
Emails have been sent to city employees in multiple departments telling them to unplug their computers if they notice suspicious activity. Professor Green said that directive and the note itself is indicative of a serious ransomware attack.
One expert said based on the language used in the message, the attack resembles the "MSIL" or "Samas" (SAMSAM) ransomware strain that has been around since at least 2016.
According to the U.S. Department of Justice, the SAMSAM strain was used to compromise the networks of multiple U.S. victims, including 2016 attacks on healthcare facilities that were running outdated versions of the JBoss content management application.
SAMSAM exploits vulnerable Java-based Web servers, using open-source tools to identify and compile a list of hosts reporting to the victim’s active directory. The actors then use psexec.exe to distribute the malware to each host on the network and encrypt most of the files on the system. The actors charge varying amounts in Bitcoin to provide the decryption keys to the victim.
Typically, if the ransomware virus is not intercepted before it takes control of systems, the user cannot gain access. The hackers demand money in exchange for a decryption key. Tech experts tell us even if that ransom is paid, the key often doesn't work. Sometimes, the only way to regain access is to rebuild the entire system.
submitted by Cyber_Bash to CERTCybSec [link] [comments]

Digital Artist: Back Up Your Artworks on an unattached external storage now.

This September seems to be the peak epidemic period of Cryptowall Ransomware and all of its numerous variants.
CryptoWall is a file-encrypting ransomware program that was released around the end of April 2014 that targets all versions of Windows.
When you are first infected with CryptoWall it will scan your computer for data files and "encrypt" them using RSA-2048 encryption so they are no longer able to be opened.
There is no known utility to decrypt RSA-2048 encryption without the private key held as ransom by the evil virus writer. Brute force decryption approach would take around 100 years to decrypt a file.
Once the infection has encrypted the files on your computer drives it will open a Notepad window that contains instructions on how to access the CryptoWall Decryption Service where you can pay a ransom to purchase a decryption program.
The ransom cost starts at $500 USD and after 5 days goes up to $750 with the cost increasing again after another 24 hours to a maximum ransom of $1,500 USD. This ransom must be paid in Bitcoins and sent to a Bitcoin address that changes per infected user.
Besides your local hard drives, it attacked all mapped network drives and all external storage devices attached to your computer (flash drive, USB external hard drive, thumd drives, USB sticks... everything You name it). This virus also encrypted files on your Cloud backup such as Dropbox drive or Google drive too.
It slips by Anti-virus and anti-trojan software on your pc without any detection (The new CryptoWall samples were not detected by any of the 55 antivirus products used on the VirusTotal website when they were discovered Sunday), so more often than not when You found out about the virus, all your files on all your drives have already been encrypted.
Some digital artists have lost all their artworks by not having a reliable unattached incremental back ups or having an unreliable external backup drive which was attached to the pc at the time so the back up was also encrypted.
All your personal documents and artworks could be wiped out in around 2 hours. On the average it takes only around 2 hours to encrypt a 2 terabyte drive.
Please digital artists, back up all your artworks on a reliable external hard drive and disconnect it from your computer after a successful back up and store it in a safe place.
Info about this scary virus
DL ( I have just lost all my drawings without backup) :)
submitted by drawinglearner to ArtistLounge [link] [comments]

[REQ] 3 BTC to prevent loss of years of essential work to be paid back by 6/10

Request: 3 BTC
Interest: Negotiable, I can pay you in full today via PayPal but I will still pay some amount of interest if you can help me
Location: Missoula, MT, USA
Accepted Payment: BTC
Reason: Last night my computer and all of my networked HDDs (including my backup HDD that was plugged in at the time) got infected with Ransomware. If you're not familiar with this, it means that all of my personal files have been encrypted and someone is trying to get me to pay to decrypt them. If I don't pay in 96 hours, I will lose my files forever. Every thing I have found while researching this virus (CTB-Locker) leads me to believe that it is legit and that paying is the only way to recover my files. The ransom is 3 BTC (bitcoin) which is currently about $690. I have the money to pay, but I have no way of acquiring 3 BTC before the deadline. Please help me. I have 13 years of work on this computer, including much that is truly irreplaceable. Beyond the usual pictures and docs, I have lost the last voicemail recording my grandmother left me before she died, confidential information from my business clients, home movies, and more. I am devastated.
Edit: After a drive to Canada, I managed to acquire some BTC and paid the ransom (for better or worse). I have recovered my files, and I'm in the process of ensuring nothing like this ever happens again. Thanks to those who commented or PMed me to help me figure this situation out. Wish it had ended up without money changing hands, but I couldn't risk the other options.
submitted by SJtheFox to borrow [link] [comments]

New and need to buy now if possible.

I apologize if we are skipping some rules for the sub but we are at work and we have had the cryptowall virus. We are going to pay the ransom - yes we know the risks, sadly it's where we are with this thing. None of us have used bitcoin and we have set up probably 10 accounts by now but have yet to be able to simply purchase any using a card. Either the verifcation takes days or simply cards are not an option. If someone (with a good rep) would like to sell us some we will gladly pay including some fee that an exchange would have charged. Thanks!
If someone can decrypt these files we would simply just pay you.
submitted by deathbymonkey to BitcoinBeginners [link] [comments]

Crypto hijack? How do I help them properly, haven't done much so far. Want to have a better plan.

Not sure if this is the appropriate subreddit but anyway: My relative's work computer recently got locked up with a Bitcoin Decrypt virus. They run client files and company stuff from it but can no longer access anything without it printing out wrong.
Has there been any progress made on undoing this virus? What should they do? I looked at it real quick and found the program in the %Temp% folder and deleted it but the files are still locked. They told me about it last second today so I haven't had a lot of time to try much on it.
I did a quick google search on it and it seems some people actually paid the ransom. I was surprised and thought maybe it was just more advertising to try and get people to pay. So here I am on reddit to hopefully get some unbiased opinions on what to do.
Oh and I unplugged their back up hard drive but I have no clue if it's infected yet until I try testing it on a fresh computer.
I'll be spending more time on their computers tomorrow. I'm not exactly an IT expert other than basic knowledge from years ago. Just wondering what the best route is for them. I noticed all the files are white and not even their background image works. Any tips or advice would be great. Thank you.
submitted by silentorbx to techsupport [link] [comments]

Paying Cryptowall in Bitcoin

Hey guys!
Unfortunately, I write you with bad news and in hopes for a quick solution... A guy at work picked up the cryptowall virus and he needs to pay the ransom by Saturday. I want to help him out and make sure that he gets his files without getting ripped off.
I have been to coinbase and found that it could take up to a week to get approved to start buying bitcoins and receive them in my wallet. I am looking at coin cafe right now and it looks like I can go to a Bank of America and just pay them...
So the solution I'm really looking for here is a way to buy about $500 of bitcoins (1.56BTC) the fastast way possible. (I dont live in New York) I would much appreciate any helpful suggestions, personal experiences or insight on coin cafe or other bitcoin sellers.
Thank you so much!
EDIT: I paid the bastards! I used circle. But note, they only allow you to withdraw $500 a week and that put me just shy of what I needed to send to get the decryption software. So luckily I had some bitcoins in another wallet I could make up the difference.
submitted by ZS1AY3R to Bitcoin [link] [comments]

[uncensored-r/Bitcoin] Need to buy .2 BTC immediately with either paypal or credit card

The following post by xpenguinxninjax is being replicated because some comments within the post(but not the post itself) have been silently removed.
The original post can be found(in censored form) at this link: Bitcoin/comments/7ra5co
The original post's content was as follows:
I am currently faced with the option of paying ransomware for a crypto virus. Ive exceeded all other options, the best choice ive gotten is to pay the ransom because to pay for decryption through a legitamite company would cost approx 11k usd and to pay ransom will cost about 2500k usd. Right now there are limits on all the bitcoin purchasing sites that are either 250$ or they wont approve my id because theres high volume of traffic. Is there any recommendations on where i could buy this?
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

GUSAU virus decrypt - YouTube How to remove Meds Ransomware COPA file virus ransomware [.copa] Removal and decrypt ... Copa File Virus Ransomware [.Copa] Removal and Decrypt ... Watch in Action Ransomware attacks PC LIVE! BART Variant ...

It’s a malware (a Trojan or another type of virus) that locks your device or encrypts your files, and then tells you that you have to pay ransom to get your data back. It’s not cheap, and there’s no guarantee of success. If you become a victim of ransomware, try our free decryption tools and get your digital life back. Remove the ransomware first (you can use Kaspersky Internet Security ... Known Bitcoin Payment addresses for CryptoDefense. CryptoDefense allows you to pay the ransom by sending bitcoins to an address shown in the CryptoDefense Decrypt Service page. Bitcoins are ... Pay us bitcoin or never see your files again: Inside the highly profitable underworld of ransomware In wake of an attack on computers at Colorado’s DOT, experts at Webroot shed light on ransomware The common user experience when it comes to ransomware looks like this: you open a website then accidentally download and install a piece of software. You might even not notice that youve done that. For some time nothing happens and suddenly you see a notification that all your files are encrypted by a Trojan that wan According to the developers of this ransomware, you have a several hours to pay a price for the decryption key, which may be the only way to get access to your file once again. The requested ransom “fee” by the hackers is usually paid in BitCoin. This Repl Virus sets it’s own suffix as the default extension of all of the affected files ...

[index] [24043] [19315] [26890] [39724] [2383] [18998] [19535] [5121] [22427] [3761]

GUSAU virus decrypt - YouTube

Easily Decrypt Files Encrypted By .heroset Ransomware 2019 New Download Method : Yes go to the link and click on Download-Direct Download -(You Don't Need To... Meds ransomware is the threat that demands ransom in Bitcoin for file decryption when the virus locks your data. You can read about the cryptovirus more: htt... DO NOT DO THIS ON YOUR PC! This is running inside a virtual machine, Ransom Ware variant BART infects the PC less then few seconds and demands a 1 Bitcoin Ra... EFJI Virus File Ransomware [.efji] Removal and Decrypt Guide In this video I will show you how to remove EFJI ransomware from your pc and how to recover you ... COPA is a STOP/DJVU family of ransomware-type infections..... for more: This rans...