Also a lot of computer manufacturers and sellers don't include a reimage DVD or whater,
In my opinion, hard copies of a new computer image should be included by federal law. Hell Windows Ha-eight doesn't even have a product key sticker, anymore
Also a lot of computer manufacturers and sellers don't include a reimage DVD or whater,
In my opinion, hard copies of a new computer image should be included by federal law. Hell Windows Ha-eight doesn't even have a product key sticker, anymore
That's all good and fine, but no one does it.
They generally just use a computer, do no backups and barely if ever a decent antivirus program.
We can preach till blue in the face, but only hear from them after the infection.
The ones I hate the most are the ones that call and tell us they can't afford to pay our cost's because they gave the scam all their available funds, so "can't we give them a special deal?" :finga:
Also a lot of computer manufacturers and sellers don't include a reimage DVD or whater, but a little pop up comes up on the screen telling them to make a restore disc set, but they don't do that either.
Then all this aside, Windows WILL get infected somewhere somehow anyway because it's the nature of the beast.
(the easier it is for the average person to use, the easier it gets taken advantage of)
Sorry --- but each platform is vulnerable, regardless of OS deployed, and bad actors in fact - do compromise all platforms. Ironically OSx Yosemite and iOS are among the most easy to use consumer grade products but almost exclusively rely on code signing and a few other weak security measures which can be easily bypassed by bad actors with weak technical skill. App vetting is also the other measure most Apple products tout, but there are easy work arounds there as well. As Apple gains greater presence, those products will be more targetted by nation states and bad actors (criminals).
To take this conversation further would be to take it places that it should not go as we all are just trying to help the OP recover his system and fix the vulnerabilities and mitigate risk going forward.
Unless you have a need to know, and work within the penn testing / forensics / malware analysis / Incident response side of the cyber security industry, you likely will not have the level of knowledge -nor the understanding on the nature of this threat. And that's OK ---- we all are just trying to help the OP recover his system and avoid these types of compromises going forward.
I stand by the recommendations to the OP --- it is his choice how to proceed.
Personally I think Microsoft should be forced out of business for producing a product that ends up costing it's customers so much time and money.
(Taxpayers enjoy the protection of the US government my ***)
They won't even stop Chinese knock off's of MSD products on Ebay.
LMAO. It's evident in recent "noose" that the govt can't even protect it's OWN systems. Does anyone REALLY believe that the huge computer glitch the last few days was "unrelated?"
All you have to do is search for ctb-locker, and look at the results... I cant guarantee these will work, but its a starting point
First result is this:
http://www.2-spyware.com/remove-ctb-locker-virus.html
Here is a video:
How to Remove encrypted by CTB-Locker virus from your desktop and recover your missing file - YouTube
All you have to do is search for ctb-locker, and look at the results... I cant guarantee these will work, but its a starting point
First result is this:
http://www.2-spyware.com/remove-ctb-locker-virus.html
Here is a video:
How to Remove encrypted by CTB-Locker virus from your desktop and recover your missing file - YouTube
Also a lot of computer manufacturers and sellers don't include a reimage DVD or whater, but a little pop up comes up on the screen telling them to make a restore disc set, but they don't do that either.![]()
I hear/see the words, but are you saying you are willing to help the OP possibly recover his stuff then?
Or telling him what he should have done, or should do next time?![]()
The issue is not that you lost your personal photos and personal files --- the real issue is that your machine had it's data exfiltrated, likely to include your executeables, hashes and password database(SAM ,etc.) to your credentials.
First think is to nuke and pave --- essentially completely re-image the machine and start a fresh install with a known good image or from your system DVD that was included when you purchased the machine. After you have a clean image installed, update each and every credential you have --- no half-stepping. Devise a decent password scheme and update passwords at least every few months - never use the SAME password on sensitive accounts or data.
BTW Linux, OSx or any other OS will also be affected by these attacks --- maybe not this exact Windows exploit, but those other platforms are also VERY vulnerable, and malware today is sophisticated enough to be platform independent.
In fact the vast majority of malware comes from either a spoofed email that a user opened and clicked on a lure link embedded in the email (Phishing-spearphishing), malvertising - bad ads on a website that can infect or redirect+ steal your credentials, an unpatched system is one of the most serious problems (Get Secunia free PSi Inspector and regularly patch your system including third party apps like Adobe, Google Chrome, Mozilla Firefox, etc.) or visiting compromised websites or downloading compromised files.
Do not drink the Apple Juice, the Kool Aid, or anything else thinking that running Linux makes you invulnerable.
Patch - Patch - Patch (secunia) - do NOT download any files or data from any questionable websites, run MalwareBytes Preminum and Malware Bytes Anti-Exploit and always change your passwords.
I do cyber security for a living --- follow these steps to lower your risk of compromise.
Would it be erroneously optimistic to assume that the source can be traced?
So I have Norton 2015 Security. Would it protect me from this type of invasion?
Just for the record, I've had that (and similar) splash/warning page come up a few times.
The first couple times, I simply turned off my computer.
No damage done either time.
Then I started seeing what else I could do...
apparently the program NEEDS you to click on something on that page to execute.
I've even gone so far as to finish what I was doing in other browser windows before restarting my machine.
Hasn't gotten me yet (of course, now that I've said all that.....)
So I have Norton 2015 Security. Would it protect me from this type of invasion?
Probably not, as I have seen plenty of them infected with that same virus. (Norton of every version you can think of)
There is a program out there called Crypto Prevent, but it's pretty new so who knows if it actually works yet.
It essentially locks those parts of the system down to prevent the virus from doing what it needs/wants to do.
Of course the same could be done manually also by changing the permissions and policies for those same system files, but who want's to go through all that when there is a program that can do and undo it with a click of a button, (If it actually works)
If you wanted to install a new program for example, that would all have to be undone and then redone after.
There are all kinds of precautions we could take but nothing is 100%
Same with removal of these little buggers (Nothing gets them all) so we have to use multiple programs and even some manual removal of bad files if needed.
I don't know, but if you are a "paid" customer, and it won't it ain't worth the box it came in