On the VM there was a new folder, C:\users\scan with a .exe. There was no new user profile.
If you can send me a copy of the .exe I can tell you what it does.
On the VM there was a new folder, C:\users\scan with a .exe. There was no new user profile.
Great news, someone has ran the new zepto ransomware on their PC.
A fun afternoon coming up.
![]()
![]()
![]()
Worst "I'll go home while IT fix my PC" excuse everBet it wouldn't have been run if the weather outside was bad.
Aaaand......we got hit again last friday. Some clutz clicked on something and we got the [email protected] crypolocker.
Weird thing though, there was no text file demanding a ransom. Luckily we caught it early enough, it had only gotten through letters A-C on the folder structure. Our backup had everything back up prior to monday morning, and only losing an hour of saved data.
People will truly never learn.
4 times this year, different users we think, Although the 3rd one was when i was holiday and i think that maybe this is a variant of that as i found some encrypted files on our backup from that date back in June.
There are a number of firms that will provide you with phishing detection training, including periodic tests, for a reasonable fee, check it out.
The other major defense against this type of thing is to use a cloud email filtering technology, again fairly reasonably priced.
Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections.
The “No-More-Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.
Since it is much easier to avoid the threat than to fight against it once the system is affected, the project also aims to educate users about how ransomware works and what countermeasures can be taken to effectively prevent infection. The more parties supporting this project the better the results can be. This initiative is open to other public and private parties.
Aaaand......we got hit again last friday. Some clutz clicked on something and we got the [email protected] crypolocker.
Weird thing though, there was no text file demanding a ransom. Luckily we caught it early enough, it had only gotten through letters A-C on the folder structure. Our backup had everything back up prior to monday morning, and only losing an hour of saved data.
People will truly never learn.
4 times this year, different users we think, Although the 3rd one was when i was holiday and i think that maybe this is a variant of that as i found some encrypted files on our backup from that date back in June.
Once you get it restored it's time to look at the rights that user had, no way it should have spread that widely from one user.
Mimecast is good for this sort of thing.