Announcement

Collapse
No announcement yet.

good news for win users/admins

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    good news for win users/admins

    http://www.theregister.co.uk/2015/11...or_ransomware/

    #2
    Re: good news for win users/admins

    Hahaha!
    ASRock B550 PG Velocita

    Ryzen 9 "Vermeer" 5900X

    32 GB G.Skill RipJaws V F4-3200C16D-32GVR

    Arc A770 16 GB

    eVGA Supernova G3 750W

    Western Digital Black SN850 1TB NVMe SSD

    Alienware AW3423DWF OLED




    "¡Me encanta "Me Encanta o Enlistarlo con Hilary Farr!" -Mí mismo

    "There's nothing more unattractive than a chick smoking a cigarette" -Topcat

    "Today's lesson in pissivity comes in the form of a ziplock baggie full of GPU extension brackets & hardware that for the last ~3 years have been on my bench, always in my way, getting moved around constantly....and yesterday I found myself in need of them....and the bastards are now nowhere to be found! Motherfracker!!" -Topcat

    "did I see a chair fly? I think I did! Time for popcorn!" -ratdude747

    Comment


      #3
      Re: good news for win users/admins

      How exactly were the keys "obtained?" Aren't they generated by a hashed value dependent on the infected system?

      I don't mean the keys that the authors received from their deployments' uploads; if someone else is rooted, how do they get their key now?

      Oh right- FDISK...
      "pokemon go... to hell!"

      EOL it...
      Originally posted by shango066
      All style and no substance.
      Originally posted by smashstuff30
      guilty,guilty,guilty,guilty!
      guilty of being cheap-made!

      Comment


        #4
        Re: good news for win users/admins

        probably an eliptic curve based encryption - there will be a seed key.
        same as sony uses on the ps3

        Comment


          #5
          Re: good news for win users/admins

          Originally posted by kaboom View Post
          How exactly were the keys "obtained?" Aren't they generated by a hashed value dependent on the infected system?

          I don't mean the keys that the authors received from their deployments' uploads; if someone else is rooted, how do they get their key now?

          Oh right- FDISK...
          Perhaps the keys were phoned home and on file in a database?
          sigpic

          (Insert witty quote here)

          Comment


            #6
            Re: good news for win users/admins

            How else could have Kapersky obtained them? They had to be on record unencrypted. Perhaps the ransom-ware keys were limited to 14,000 of them and were selected in sequence or at random at the source, then encrypted during the infection process. These are questions for Kapersky Labs.

            Comment

            Working...