Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43438
  • Total Topics: 16532
  • Online today: 3056
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 3
Guests: 2884
Total: 2887









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: krrjhn
« on: 25. January 2011., 07:54:38 »

I just fed up with these viruses!!
Posted by: Samker
« on: 30. November 2010., 12:35:54 »

A ransomware Trojan threat is back – in an even more noxious form – two years after it last appeared.

A new variant of the GpCode ransomware encrypts user files on infected Windows PCs using theAES 256 and RSA 1024 encryption algorithms. The malware only encrypts the start of media or Office files, but that's enough to make any data recovery process difficult if not impossible.

The latest version of the malware overwrites data in files instead of simply deleting files after encryption, the approach taken by previous versions of GpCode. The approach makes it far harder to use data-recovery software.

The unknown miscreants behind the Trojan – who first started operating in 2004 but have been quiet since 2008 – then demand $120 for keys needed to decrypt files, via a notice displayed on infected machines after the malware has scrambled user files. Other ransomware scams have cropped up over the last two years, but none of these involved variants of the GpCode Trojan, according to net security firm Kaspersky Lab.

A write-up of the attack, together with screenshots, can be found in a blog post by anti-virus analyst Vitaly Kamluk of Kaspersky Lab here: http://www.securelist.com/en/blog/333/GpCode_like_Ransomware_Is_Back
Victims are instructed to send funds via a wire transfer if they ever want to see their data again.

Sophos adds that the malware apparently comes via a drive-by vulnerability from compromised websites, A malicious PDF is reportedly used to download and install the ransomware, which only affects Windows PCs: http://nakedsecurity.sophos.com/2010/11/26/drive-by-ransomware-attack-demands-120

Users are advised to regularly back up sensitive data and to use security software as a precaution against possible attacks.

(ElReg)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023