What about cloud accounts things like Dropbox, Skydrive that both accessed within Windows file explorer as another folder
Would these be susceptible to this or not?
Depends on what kind of protocol is used. If you have permission to modify files on the fly and the remote location is mounted "live", then I don't see why not. Would take a long time though depending on how much data there is. It wouldn't occur server-side (unless it's the remote server that is infected), so the file would probably have to be downloaded, encrypted locally then re-uploaded.....
However if you have a local<=>remote sync set up (such as a dropbox folder) it will simply encrypt the local file which will then get synced to the remote server and overwrite it.
If you require login/password each time to log in to some kind of web interface with only basic manual operations over HTTP like upload/move/delete (such as skydrive's web interface), then I highly doubt it can cause any damage to the remote files. Actually I'd say impossible.
What would I recommend? Be very cautious if you have any folders which sync, in fact remove sync if viable and limit to manual uploads. If you must have a sync active, keep an eye on the relevant activity icon in the system tray, or monitor bandwidth usage with a tool such as DUmeter, or keep an eye on your router LEDs for any idle activity.
This may be a stupid question but can't the Police trace these criminals through where they're being paid too?
This may be a stupid question but can't the Police trace these criminals through where they're being paid too?
How does that change anything?
Nate
Like Nate says, how does using a virtual machine help?
Presumably running on a Windows host, therefore the virus can potentially infect the host surely?
I am also interested how it can spread to machines across networks. I know it can access any files the infected machine have access to across a network, but how does it hit other machines? Would it only work if there are shares the infected machine had access to?
Seriously considering with so many threats appearing to keep one machine completely disconnected most of the time for my main uses and just keep an older machine for anything internet based.
it isolates the virus to within the virtual machine, the virus as such cannot see anything outside the OS it is sitting on if set up properly
Only communication from VM to host is the bridged wifi, my virtual shared folders are not persistent and need a password to activate. So the virus could lock down the VM, bit hopefully not move across to the host.
I'll be moving to a Ubuntu host in the near future, which should mitigate the problem further
One of the many reasons why I converted my mum to linux
So running is running Chrome with free AV software and as usual watching what I open enough to keep this nasty thing out of my machine?
it isolates the virus to within the virtual machine, the virus as such cannot see anything outside the OS it is sitting on if set up properly
Erm, how?
Yes, but what stops the virus infecting the host computer directly