Pages:
Author

Topic: Ransom demanded from an attacker (Read 4035 times)

legendary
Activity: 1848
Merit: 1009
Next-Gen Trade Racing Metaverse
February 01, 2016, 12:13:17 PM
#33
Install a good antivirus(it cost you up to 60 usd per year) if you really want to be protected and back up your daily/weekly.

The AV will not stop a hacker, if he has remote access to your computer or server via a backdoor. They will exploit that and just encrypt your data. We used to do that in a class room environment at school and we used a simply encryption in Pkzip.

It was mostly for fun to get some extra food for lunch. The data was usually homework that was done by the students. We got caught and we got a massive hiding, which ended our hacking extortion scheme and cut off our extra food.   

Any tips to prevent this from happening to us, that is, aside from not downloading crap received from emails?
member
Activity: 79
Merit: 10
February 01, 2016, 12:09:41 PM
#32

Hi all.

Just to share, we received the reply from the attacker as shown below.

Waiting for my brother to check and decrypt. I don't know if this works or not.



---------- Forwarded message ----------
From: Jack Williams <[email protected]>
Date: 2015-11-07 18:12 GMT+03:00
Subject: Re: Fwd: Email
To:

Hello!

Do you have process in the memory called lsassw86s.exe ? If yes , kill process lsassw86s.exe first.
Also delete c:\windows\system32\lsassw86s.exe file.

Now you can run decrypt tool.

1st Decrypt password: 145C7C3F238B235F36C19125854FC9A77A6K7)CIAu4wCUBc407T2(E3B43vEQ4q8R9I1g5b7kB*9fDzE3EwEa1+8i5N4F8)Dt4v712QB=5d0q8i0k
2st Decrypt password: 21063857F60263D5921FFD2CB9B24E569(C54l6sDI9u1v4d7C2p7dA(BDCICSCv9FCl98744MEy8&BO7p7VASEo2@EXCODQCf619-DU6gCa4q9E0u
3st Decrypt password: quu*A**$$quu*V$uLFquu*V$uLF


Decryption tool (password for the archive: 123 ):

https://www.sendspace.com/file/ex2rs1

Download it and unpack to any folder. Also program require administrative rules (use administrator account).

Run decrypt.exe .

Copy paste 1st Decrypt password, 2st Decrypt password and 3st Decrypt passwords in decrypt tool 3 fields.

If you have not stop our software - use decryption tool, because the tool will stop our software before decrypting the files.

This is very important to stop our software service (and dont delete any files in ProgramData folder before stop) because your decrypted
files may will be encrypted again.

p.s. when you will start decrypt tool it would seem as if the program hanging, but everything is fine, just wait for the message about
successful completion of decrypting and dont touch decrypt window with your mouse.

If you have any questions or troubles in decrypting feel free to contact me .


Thank You!

So does this mean they put 3 layers of cryptography around your data??

It's pretty impressive
member
Activity: 84
Merit: 10
February 01, 2016, 06:55:36 AM
#31


This is for my brother.. who has noting to do with Bitcoins... He had to pay to get his business data.  Angry Cry

Bitstamp just confirmed that non of their users use this email address.... which most probably is for Multibit or something like that...

Why the hell would the guy use the same email to ask for ransom and to register in an exchange?

i`m sorry for your loss, btw
legendary
Activity: 2492
Merit: 1018
February 01, 2016, 02:55:18 AM
#30

I hope a trend hasn't started where people start demanding bitcoin for all criminal attacks or could that be good for the market price hmmm ? Conclusion, bitcoin is going to change the world.

When Monero becomes popular in the near future, the attackers will demand Monero payment. That is more anonymous than bitcoin.

Sure it will be one of their option in the future. they need no bitmixer to simply avoid tracking.
Information the OP's brother trying to cover must be very private, must be worth paying the ransom for it could get him in trouble lol
full member
Activity: 189
Merit: 100
February 01, 2016, 02:34:49 AM
#29

I hope a trend hasn't started where people start demanding bitcoin for all criminal attacks or could that be good for the market price hmmm ? Conclusion, bitcoin is going to change the world.

When Monero becomes popular in the near future, the attackers will demand Monero payment. That is more anonymous than bitcoin.
legendary
Activity: 1946
Merit: 1007
February 01, 2016, 02:10:45 AM
#28

Reply from BTC-e  Angry Huh

Дoбpый дeнь

Этoгo aдpeca y нac нeт.



good afternoon

It addresses we have.


 Huh

If this is true, try presenting them with the proof that the funds were acquired after hacking. If you are lucky they will freeze the account and possibly even return the coins to you


Doesn't hurt to try at least.
legendary
Activity: 3542
Merit: 1965
Leading Crypto Sports Betting & Casino Platform
February 01, 2016, 01:17:22 AM
#27
Install a good antivirus(it cost you up to 60 usd per year) if you really want to be protected and back up your daily/weekly.

The AV will not stop a hacker, if he has remote access to your computer or server via a backdoor. They will exploit that and just encrypt your data. We used to do that in a class room environment at school and we used a simply encryption in Pkzip.

It was mostly for fun to get some extra food for lunch. The data was usually homework that was done by the students. We got caught and we got a massive hiding, which ended our hacking extortion scheme and cut off our extra food.   
legendary
Activity: 1470
Merit: 1004
January 31, 2016, 08:02:54 PM
#26
Install a good antivirus(it cost you up to 60 usd per year) if you really want to be protected and back up your daily/weekly.
newbie
Activity: 1
Merit: 0
January 31, 2016, 04:29:07 PM
#25
Hello,

We were also attacked by this person, the virus was identified and disabled, but is was too late. Did your brother recover his files after paying the ransom?
member
Activity: 78
Merit: 10
November 09, 2015, 03:53:32 PM
#24

Reply from BTC-e  Angry Huh

Дoбpый дeнь

Этoгo aдpeca y нac нeт.



good afternoon

It addresses we have.


 Huh
member
Activity: 78
Merit: 10
November 08, 2015, 06:26:58 AM
#23

I think there was a Vulnerability  in RDP at that time where the attacker was scanning possible open systems....
member
Activity: 104
Merit: 10
November 08, 2015, 05:45:29 AM
#22
Crypto Lockers are definitely easy to remove.
hero member
Activity: 546
Merit: 500
November 08, 2015, 05:04:41 AM
#21

I hope a trend hasn't started where people start demanding bitcoin for all criminal attacks or could that be good for the market price hmmm ? Conclusion, bitcoin is going to change the world.
hero member
Activity: 1582
Merit: 502
November 08, 2015, 04:35:39 AM
#20
How did you brother download the scam tool and run it in the first place?
Can he trace the source?
member
Activity: 78
Merit: 10
November 08, 2015, 01:44:15 AM
#19

Hi all.

Just to share, we received the reply from the attacker as shown below.

Waiting for my brother to check and decrypt. I don't know if this works or not.



---------- Forwarded message ----------
From: Jack Williams <[email protected]>
Date: 2015-11-07 18:12 GMT+03:00
Subject: Re: Fwd: Email
To:

Hello!

Do you have process in the memory called lsassw86s.exe ? If yes , kill process lsassw86s.exe first.
Also delete c:\windows\system32\lsassw86s.exe file.

Now you can run decrypt tool.

1st Decrypt password: 145C7C3F238B235F36C19125854FC9A77A6K7)CIAu4wCUBc407T2(E3B43vEQ4q8R9I1g5b7kB*9fDzE3EwEa1+8i5N4F8)Dt4v712QB=5d0q8i0k
2st Decrypt password: 21063857F60263D5921FFD2CB9B24E569(C54l6sDI9u1v4d7C2p7dA(BDCICSCv9FCl98744MEy8&BO7p7VASEo2@EXCODQCf619-DU6gCa4q9E0u
3st Decrypt password: quu*A**$$quu*V$uLFquu*V$uLF


Decryption tool (password for the archive: 123 ):

https://www.sendspace.com/file/ex2rs1

Download it and unpack to any folder. Also program require administrative rules (use administrator account).

Run decrypt.exe .

Copy paste 1st Decrypt password, 2st Decrypt password and 3st Decrypt passwords in decrypt tool 3 fields.

If you have not stop our software - use decryption tool, because the tool will stop our software before decrypting the files.

This is very important to stop our software service (and dont delete any files in ProgramData folder before stop) because your decrypted
files may will be encrypted again.

p.s. when you will start decrypt tool it would seem as if the program hanging, but everything is fine, just wait for the message about
successful completion of decrypting and dont touch decrypt window with your mouse.

If you have any questions or troubles in decrypting feel free to contact me .


Thank You!
member
Activity: 78
Merit: 10
November 07, 2015, 03:05:33 PM
#18


Google did not reply yet for who or where is the location this person is sending us messages.
member
Activity: 78
Merit: 10
November 07, 2015, 02:39:55 PM
#17


Hi all,

thanks for the replies. Unfortunately the backup drive was connected to the server and got encrypted. It is nit a virus but a person who logged using RDP Sad according to hos answer when we asked how did he break in.

If we had time we would not pay and try to use other methods... but the need for accounting data made the decision to pay.
He was wrong and is feeling the mistake.....
hero member
Activity: 770
Merit: 509
November 07, 2015, 01:55:14 PM
#16
I would never have valuable information on a Windows machine. If you do, at least just copy it to an USB and a trusted cloud somewhere on the internet (prior being encrypted with a strong pass of course). I don't understand how people fall for this ransomware crap, it doesn't seem that sophistcated, just keep your stuff updated and don't click on dodgy shit.
legendary
Activity: 1386
Merit: 1123
November 07, 2015, 01:49:40 PM
#15
As other users have stated before it is ESSENTIAL to back-up anything that is truly important or of value twice in separate mediums.
Never let someone blackmail me you because you forgot to back-up your wallet, or other important files. It just will make you facepalm for ages.
legendary
Activity: 1039
Merit: 1005
November 07, 2015, 11:37:56 AM
#14
Have you looked at http://support.kaspersky.com/viruses/disinfection/8547 ?
It seems that at least for some crypto locker type trojans, Kaspersky has decryption utilities.

Of course, as others have noted, regular backups rule. Make sure that whatever happens to your computer, you can just continue with a new one (or reformatted one in a case like this.)
Making backups is like brushing your teeth: If you don't do it, you'll only realize that you should have done it when it's too late. Make it a regular exercise to back up your data!

Alas, anti-virus software can't always protect you - some trojans have ever-changing contents and behavior that makes it hard for AV software to recognize them, even with heuristics.
Brain 2.0 is a much better protection against this kind of malware - if something's smelly about an e-mail you got, even when the sender's address is one you recognize, your first suspicion is often correct.

Onkel Paul
Pages:
Jump to: