The company I work for is getting blasted with an RSA 4096 ransomware virus (pic related) and all I'm finding online is how to remove it and nothing to do with how it operates.
I'm to the point no where I ethics are out the door and I can infect a retired computer to recreate the virus and figure out how it works that way.
Is there any other way to go about learning these things or should I just go ask spiceworks?
Adrian Perry
Restore a previous backup.
Sebastian Torres
What kind of garbage company do you work for where this was even possible?
Hell, who the fuck was stupid enough to introduce this virus to a work PC in the first place?
Jack Torres
>how does it work? By encrypting your files, you fucking moron.
Jayden Nguyen
>running work pcs with admin privileges HAHAHAHAHAHA
Charles Lopez
Install Gentoo and never worry about malware again.
Adrian Wright
It encrypts your files and store the private key in their server. You can't do shit.
Parker Richardson
I don't think you tuff guys get the point of what I'm saying. Were trying to build a script to prevent it from installing to a specific root. We will push that through a windows patch but only after we figure out how this this works.
Do you feel big? Do you feel tough bc you can jump to conclusions and force you "superiority" on le n00b xDd? kys or help brainstorm faggots.
Joshua Kelly
^^ especially you faggot
Jeremiah Martin
I don't think you know how computers or Google work desu.
Nathan Nguyen
>Were trying to build a script to prevent it from installing to a specific root Don't give it permissions to install there.
Ryan Collins
IM TRYING TO FIGURE OUT WHERE THE FUCK IT INSTALLS YOU FUCKING RETARD
Kevin Williams
>BAWWWWWWW!!!!!!!!! why won't Sup Forums be my tech support?!!!!1111oneone
Joseph Brown
I'm an intern ;_;
>pls respond
Landon Smith
You seem like you have never written anything in that sector. Even the smallest virus can escape all your plans by just using random folders and filenames. >inb4 how does that even work out? It is called permutation. Cryptlocker can only be stopped by not being stupid and surfing on sites nobody knows, with flash enabled (and possible java and other stuff). Install linux and just enable a few websites that you know. Disable all usbs, dvd drives and everything else too because your people are fucking stupid I guess.
Gavin Morales
also >secure trip
are you like the 4chang god bc ur cool
Eli Martin
Probably somewhere on the C:\ drive
Dominic Nguyen
I get the feeling the OP lied about his qualifications to get a job, and now, he is freaking out because he is going to get fired.
Yes.
Easton Reed
In temp folder, usually. What's more important, you should figure out what kind of file is that. We got hit by js executed by WScript, so I denied the WScript execution.
Jordan Hughes
once again, kys edge-lordington le basement warlock
Isaiah Reyes
Don't be so mad OP
Easton Lopez
ok, but I'm having a hell of a time rn m8
That's the thing, I'll try my best to find it but it doesn't seem to be there.
Jaxon Moore
What so you manage to secure your computers from one instance of a crytolocker attack but what happens when one of the hundreds of other variants find their way in?
We keep getting hit with locky and the most effective way of combating it is to just restore from the nightly back up.
You should only be getting a serious infection on one PC and encryption on any discoverable share drives.
If your share drives are not write protected based on AD credentials than get your shit together. If this malware has managed to get into other PCs and encrypt them as well than your permissions are a fucking joke.
The reason this is so effective is because there is no easy counter to something like this. You and your buddies can go write as many scripts as you want but your best bet is to stop your users from downloading the fucking things. Not playing Mr Robot and wasting time
Matthew Morgan
If I was your boss, and I learned that you were so under qualified that you had to go to a website made for weeaboos who like anime to learn how to stop one of the most common security threats facing PC's because of your incompetence, I'd have you fired on the spot
Wyatt Stewart
>mfw Windowsfags can't force a policy that only allows executables that match a whitelisted SHA512 to run lmaoing @ your company
Cameron Bailey
>what is a group policy object
Jack Rivera
>>mfw Windowsfags can't force a policy that only allows executables that match a whitelisted SHA512 to run literally lmaoing, show me in group policy where you can specify a whitelist with executable hashes.
Noah Campbell
How the fuck did you even get a job in IT? Did your certifications come in a cereal box? This is pathetic
Adrian Bennett
I'm going to look this over after work, thanks for the input.
David Long
Is that AppArmor or SELinux?
Ian Rodriguez
Time to format your disk and install from backup.
Brody Barnes
Retard.
Jackson Lopez
pls kys
do it for the kids
William Parker
Unfortunately, the best way to get past these is actually paying the ransom. There isn't a lot of ransomware that you can crack within the time limit they give you to pay.
Jackson Lee
Either the ransomeware authors fucked up and someone made a decryptor already, or youre fucked and have to pay. Have backups and be less incompetent next time.
Nicholas Powell
We can't do that in our environment.
Sebastian Garcia
>We can't do that in our environment. Well apparently you can fuck up all your files and install malware, so get formatting.
Anthony Diaz
It doesn't matter what you think you can or can't do, you got fucked by ransomware. Restore a backup or accept your fuckup and pay some Russians
Luis Price
I'm not kidding about How much are they asking?
Cameron Bell
I'm guessing your looking to prevent it from happening again? Well the ransomware virus is just the payload. The attack vector they used to infect the machine is what your looking for, which differs case by case. You can easily mitigate the effects by standard security patches and a good backup policy.
Chase Baker
Some of you guys are OK, don't go to work tomorrow.
Xavier Harris
If your looking to recover your files you will not be able to. Because in order to do that you would have to break RSA-4096. Well i guess you could...it would take about 10 years though.
Juan Roberts
Autism.
You back up all personal files to a sharepoint or cloud and combat the problem by being smarter than it. Good luck with your Linux meme in the real world where you have to provide service to normies, fucking idiot.
Jayden Johnson
you would have to break RSA encryption*
Nathan Hill
see
Easton Cox
? i think the problem is OP didnt back up his files before ransomware hit.....so yes his only option is to pay the ransom.
Justin Hernandez
see
Andrew Roberts
Question. How do I use a guest account so that viruses and shit can't fucking install? Also, if I try installing a program will it let me? Or would I have to go into admin or enter a password?
Brandon Lewis
Next time wither don't use WIndows or set appropriate security measures
>Is there any other way to go about learning these things or should I just go ask spiceworks?
If you want to learn how it works ask the people that created it or the people that created the way to remove it
Justin Cooper
i can see through your writing 'skillz' why your office is fucked over.
Cameron Reed
>not understanding the problem
Chase Rogers
no one cares about the files, we need to stop happening in the future, sperg
Kevin Walker
Reverse engineer it on your own kiddo.
Not all strains are the same and most will attempt to infect each account, not just one. Do it on a VM and monitor what it does. Some use known exploits. Others wait for user to let them in.
Jackson Anderson
I'm going to beat your grandma
Jack Ramirez
And on that note, you're not going to be able to "jail" this file with permissions. Nor will it be easily found. Anti-viruses do most of this for you and much better than probably any script you'll write. Programs make changes to the disk all the time and not even in the directories they "promise to stay in". You're looking at tedious sanitation or impossible chasing of "suspicious processes".
Landon Nguyen
Just download the crypto preventer thing from FoolishIT, and set it to the 3rd or 4th setting.
Levi Torres
>how do i use a guest account control panel>user accounts>manage accounts >will it let me install a program Probably not as a guest you will have to enter admin password or you can change the group's policy, but then there would be no real point of using a guest account.
Brandon Young
Look, guys. OP is not talking about how to save himself from this thing but actually to find out how this works.
He probably just wanted to get praised and raised by his boss for writing a script that could prevent this thing from working.
But you're forgetting something, OP. There are numerous kinds of variants of this thing out there. To stop it completely with just one sample is not going to do anything.
Just leave the job to actual security experts and start picking up the damn phone.
Nolan Butler
This, so much this. Biggest thing that helped my organisation was to disable macros by default in any MS Office document though
Landon Perry
This question is the same as how do i avoid getting virus's remember ransomware is just the payload there are loads of ways it could have got in.
Aaron Rodriguez
You ever think your company is suspectable to this shit because they have retards like you beinf responsible?
You guys are fucked.
Josiah Turner
okay, thanks for the input
Jordan Stewart
Right-click the process in task explorer and navigate to the file? Install software to monitor your file system to see where new files are created?
What kind of answer do you expect you ass? Someone to point you to "Ransomware executable finder pro edition 2016" or something? Learn what computers and processes are first, then you'll know what to do using that brain God gave you
Jaxson Rodriguez
>God O I'm laffin
Michael Morgan
I knew that would trigger some edgelord hahaha
PS: saged for going offtopic
Gabriel Martinez
delete system32
William Butler
doing it now, wish me lcuk
Jason James
>Someone to point you to "Ransomware executable finder pro edition 2016" or something?
That was the first times I've laughed today, thanks
Eli Jackson
Just use Process Monitor.
Benjamin Reed
Get fired, pajeet
Henry Barnes
misread >I'd have you hired on the spot
got confused
Lincoln Parker
>mfw Windows has no equivalent of SELinux, grsecurity, AppArmor, TOMOYO, jails etc. lmaoing at ur OS
Thomas Reyes
SELinux doesn't use SHA512 hashes but you could still configure it to prevent users from running arbitrary executables
Matthew Morris
This proves, without any doubt, that this guy is pajeet.