Ransomcrypt (aka Crypto locker) - I have read your posts on this subject and came away not being sure that I am protected against this malware. I am running N360 on my computers. Is there any further update on this malware?
Ransomcrypt (aka Crypto locker) - I have read your posts on this subject and came away not being sure that I am protected against this malware. I am running N360 on my computers. Is there any further update on this malware?
Norton ?Symantec does not detect it as Cryptolocker but as Ransomcrypt.F.
Quads
The latest Ransomcrypt.F (aka Cryptolocker) dropper I have received today is also detected by Norton / Symantec AV products.
So I will give a thumbs up to Symantec for trying really hard to keep up with this one as in my opinion ransomcrypts are worse than the likes of ransomlocks (users like to call FBI virus) and the likes of Pihar and Zeroaccess as it involves peoples PERSONAL FILES.
Quads
Quads wrote:The latest Ransomcrypt.F (aka Cryptolocker) dropper I have received today is also detected by Norton / Symantec AV products.
Quads
Thank you for the update
I don't need to do that. If I want to really figure something out I infected my system with what I need to.
Quads
fasteddie73 wrote:Ransomcrypt (aka Crypto locker) - I have read your posts on this subject and came away not being sure that I am protected against this malware. I am running N360 on my computers. Is there any further update on this malware?
Hi
I've been reading about this as well and my take on this is that the best way to protect one's PC is to maintain a full-disk backup schedule or routine. That way, you're completely protected against attacks such as this one.
If you have a spare HDD or image that's fairly recent and is not continuously connected to your PC's, your recovery time will be fast.
I have relied on cloning as my protection from malicious intrusions. It's worked well but I'm also going to maintain a couple of full-disc images which will be stored on another external HDD. Both of my recovery drives are only connected to my PC when I'm running the clone or imaging process so in the event of an attack, even one that could potentially affect all of the PC's drives that are attached to the system at the time, I'm safe from any such intrusions.
dickevans wrote:
Welcome,
I can't answer the question as to why you got infected. Most of them come hidden in innocent looking wrappers.
The other piece of bad news I have is that no security program is able to protect you 100% of the time from 100% of the thousands of threats that are being released daily.
Using a security suite with an active scanner combined with regular scans using one of the free on demand scanners provides the best available protection.
The one security device that is often overlooked is the chair / keyboard interface. It must be fully engaged at all times that the computer is connected to the Internet.
We'll be here when you need us. Til then
Stay well and surf safe
↑
I mainly depend on Norton (and MBAM) to let me know if an intrusion has been detected. If I am aware of it, the recovery step is faily fast and doesn't require a lot of time.
As Dick mentioned, there's no guarantee with any AV's ability to block all effects of every intrusion that is detected or those that get past the AV defenses.
With these encryptor attacks, I think having a couple of full-disk backups are the best way to recover since it saves time with no HDD cleanup or research / downloading of specialty cleanup tools needed and you're running again on the PC within a short period of time.
I guess for me, it's a preferred alternative which for most of us would entail spending time repairing the orignal HDD and possibly costing some $$'s in consultation fees.