Ransomware [edited title]

Thank you for doing that. It was making me twitch.

It shows how my brain works that I read the thread many times and even posted and didn’t notice. What was the original misspelling?

Ransomeware

Thank you.

Which made people frown…

So he soon posted, “Oh fuck it”.

“Ramsome” is the name of a character in Roger Zelazney’s “Nine Prices in Amber”. I claim Poetic Typo.

So you’re starting a period-specific clothing line?

One of the other things a ransomware attack will threaten is “we have your data”. I suppose it depends on what internet connection your enterprise or home has, but downloading gigs of data is not a trivial operation. More likely, the hack has just encrypted it all, they do not have time to download it. Even more so for enterprises which are likely to have hundreds of gigs. Most software is not smart enough to figure - “this is just the website product catalog with photos, no need to download this.”

Can you tell me what is an exe whitelist and how to implement it? Whenever I install something, I get a message asking if I want to allow {Whatcompany} to make changes to my computer. And if I get a message that says something generic, such as “You will find this link interesting” from someone I know, I always write to the sender asking if this message is real. If it is from someone I don’t know, I delete it. And if I send someone a link, I always put enough personal comments in it to make it clear that if is from the real me.

I don’t know your environment but application whitelisting is typically implemented through Group Policies in Active Directory. If you’re wanting to roll it out for an organization with an AD infrastructure in place Bryan Doe’s guide on Spiceworks is a good place to start:

If you don’t have an Active Directory infrastructure in place the guide can still be useful but you’ll likely need to edit your server’s local group policy settings instead of doing it in AD:

If you’re talking about something like a home computer…it’s probably still possible but it would be a lot of work to setup for just a single computer. I think I’d go a different route.

The FBI recovered some $2 million in bitcoin. Have they any way to identify individuals?

Evidently the FBI was able to crack the password of the account to which the Bitcoin was sent.

But in answer to your question:

“Right now, prosecution is a pipedream,” Vice President John Hultquist of the Mandiant cybersecurity firm said

Note that the original payment was 75 bitcoins and 63.7 bitcoins were recovered. So the majority of it was recovered. The 2.3 million value is because bitcoin are cheaper than when the ransom was paid.

At the recovered rate, a bitcoin is $38,058.8235.

I wonder if this morning’s internet outages are related to the recovery.

No. According to the New York Times, “The outage was connected to Fastly, a provider of cloud computing services used by scores of companies to improve the speed and reliability of their websites. Fastly later said on its website that the issue had been identified and that a fix was being made.”

Thanks.