Pages:
Author

Topic: Ransomware + Altcoins ? (Read 1247 times)

legendary
Activity: 3374
Merit: 3095
Playbet.io - Crypto Casino and Sportsbook
August 21, 2016, 05:12:05 AM
#26
asking ransomware with alt coin wont help alt coin to be famous, it will bring down the reputation, but let say its happen, it will be a little bit complicated, because in order to buy alt coin we need to go to exchanger, find the price rate and then deposit the money and the buy the alt coin, if the coin that the criminal want is exist, if its not exist in that exchanger, the payer need to find the wallet again and it will be difficult for the criminal to cash out, so i dont think its a smart idea
Yeah instead of altcoin will be popular the reputation will be negative they will hate that altcoin.. because they can be still solve their issue via using tools from antivirus to remove that ransomeware. so yeah its not a good idea it takes a lot of time before the victim to buy altcoin and they dont know how to buy there. . because they dont know about altcoin or crypto currency..
This is worst idea for promoting altcoin
legendary
Activity: 1666
Merit: 1001
August 21, 2016, 04:59:08 AM
#25
asking ransomware with alt coin wont help alt coin to be famous, it will bring down the reputation, but let say its happen, it will be a little bit complicated, because in order to buy alt coin we need to go to exchanger, find the price rate and then deposit the money and the buy the alt coin, if the coin that the criminal want is exist, if its not exist in that exchanger, the payer need to find the wallet again and it will be difficult for the criminal to cash out, so i dont think its a smart idea
hero member
Activity: 924
Merit: 1001
August 21, 2016, 04:14:46 AM
#24
i wonder anyone really pays money to the ransomware? Definitely they will blackmail again even after they paid.

people pay. and they pay because the get their data back. this system only works when the "hacker" really gives you the key after you have payed.
Yeah this is happens to me when i was downloading fake software online receive this virus or ransome where all my files are lock and some software dont work because it needs to unlock first before you can recover all of your files..
i have still one of the notepad from this hacker
Code:
Your files are locked and encrypted with a unique RSA-1024 key!
To regain access you have to obtain the private key (password).
++++++++++++++++++++
To receive your private key (password):
Go to http://u5ubeuzamg54x5f3.onion.to and follow the instructions.
You will receive your private key (password) within 24 hours.
Your ID# is 28403489

If you can't find the page, install the Tor browser (https://www.torproject.org/projects/torbrowser.html.en) and browse to
http://u5ubeuzamg54x5f3.onion
++++++++++++++++++++
BEWARE - this is NOT a virus.
The ONLY way to unlock your files/data is to obtain your private key (password) or you may consider all your data lost.
You have just 5 days before the private key (password) is deleted from our server, leaving your data irrevocably broken.
++++++++++++++++++++
LOCKED ON POSSESSION OF COPYRIGHTED MATERIAL AND SUSPICION OF (CHILD)PORNOGRAPHIC MATERIAL.
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 21, 2016, 03:52:01 AM
#23
Hell look at the cost of PC repair at your local stores.. they are not cheap.

That's has nothing to do with the ransomware viruses. Last year I have dealt with 2 computers, which were infected with the same ransomware (they were not in the same network, they were even in different towns) and there was no solution other than to pay. Many of these viruses are using 256 bit encryption, which is pretty much impossible to be broken. To understand this better, a computer with a performance of 30 petaflops (i.e. - capable of 30,000 billion floating point operations per second) would need more than 10 years to decrypt it.   
...

Spoetnik, you should take a break. Cheesy Go out there, see the world. Smiley
legendary
Activity: 1540
Merit: 1011
FUD Philanthropist™
August 20, 2016, 04:35:09 PM
#22
Hell look at the cost of PC repair at your local stores.. they are not cheap.

That's has nothing to do with the ransomware viruses. Last year I have dealt with 2 computers, which were infected with the same ransomware (they were not in the same network, they were even in different towns) and there was no solution other than to pay. Many of these viruses are using 256 bit encryption, which is pretty much impossible to be broken. To understand this better, a computer with a performance of 30 petaflops (i.e. - capable of 30,000 billion floating point operations per second) would need more than 10 years to decrypt it.   

You rarely ever seem to be able to follow my train of thought.
I am actually getting tired of having to re-explain myself when i already typed out a massive wall to prevent that LOL

Did you forget about my qualifications ?

I know everything.

I had the first PC.
I know hackers and have malware code on my drive right now.
I did work for the govt when i owned and operated a PC repair business i started years ago.
I could go on and on and on..

But why bother ? LOL

..next time Wink
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 20, 2016, 04:42:57 AM
#21
They were not shadow copies back in 1932 (or it was 1938?). Cheesy There was no even Windows back then. Cheesy

We had Windows ,  Cheesy  


Less Features as they were only for opening & closing and looking thru.

https://en.wikipedia.org/wiki/Shadow_Copy
Started with Windows XP,

 Cool

I know what shadow copy is. It could be maybe irrelevant, but back in 2008 I was something like a Lead jury (i.e. I was the only one inspecting the computers) in the 5th Bulgarian national competition final. The participants had certain time to assemble a computer and install + configure it. There were 3 other guys in the jury which were representatives of Microsoft, one of the biggest IT companies in Bulgaria and the biggest Hardware-related magazine in the country. They were just standing next to me and write down the mistakes I found. Smiley So, I know some stuff. Smiley

P.S. You can easily see me after 07:43 in this video and compare it with the name of the YouTube channel owner and my avatar Smiley : https://www.youtube.com/watch?v=uZCgCLRGVEE
legendary
Activity: 1092
Merit: 1000
August 20, 2016, 04:30:45 AM
#20
They were not shadow copies back in 1932 (or it was 1938?). Cheesy There was no even Windows back then. Cheesy

We had Windows ,  Cheesy  


Less Features as they were only for opening & closing and looking thru.

https://en.wikipedia.org/wiki/Shadow_Copy
Started with Windows XP,

 Cool
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 20, 2016, 04:18:57 AM
#19
Ransom guys charge a few hundred bucks , Data Recovery Firms charge in the $Thousands.

As I have said - this has nothing to do with a data recovery. Smiley You are screwed if there is no known solution (i.e. decryption). No matter if you send to a firm or to CIA/FBI.

hmm, we are losing something in translation.

If the ransomware purged the deleted files and overwrote the files with the encrypted files and removed the shadow copies, and their were no external backups , then you would be right there is nothing anyone can do except pay the ransom or lose the data.

However , if the ransomware did not wipe the deleted file or removed the shadow copies or the user had an external backup, then those are options that a PC tech could check, which would make it so the users would not have to pay the ransom.
And as I said, I did save someone's data from a ransomware virus , because that specific one left the shadow copies intact.

And those can be checked by local techs for a few bucks, there is no need for a Data recovery firm as the hard drive should be in working order.
But ransomware may or may not hit a PC, a hard drive failure is a guarantee if you keep it too long without replacing.

Either way not making periodic backups is asking for trouble, failure is not an if but a When.

 Cool

They were no shadow copies back in 1932 (or it was 1938?). Cheesy There was no even Windows back then. Cheesy
legendary
Activity: 1092
Merit: 1000
August 20, 2016, 04:11:12 AM
#18
Ransom guys charge a few hundred bucks , Data Recovery Firms charge in the $Thousands.

As I have said - this has nothing to do with a data recovery. Smiley You are screwed if there is no known solution (i.e. decryption). No matter if you send to a firm or to CIA/FBI.

hmm, we are losing something in translation.

If the ransomware purged the deleted files and overwrote the files with the encrypted files and removed the shadow copies, and their were no external backups , then you would be right there is nothing anyone can do except pay the ransom or lose the data.

However , if the ransomware did not wipe the deleted file or removed the shadow copies or the user had an external backup, then those are options that a PC tech could check, which would make it so the users would not have to pay the ransom.
And as I said, I did save someone's data from a ransomware virus , because that specific one left the shadow copies intact.

And those can be checked by local techs for a few bucks, there is no need for a Data recovery firm as the hard drive should be in working order.
But ransomware may or may not hit a PC, a hard drive failure is a guarantee if you keep it too long without replacing.

Either way not making periodic backups is asking for trouble, failure is not an if but a When.
That is my primary point.

 Cool
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 20, 2016, 03:44:37 AM
#17
Ransom guys charge a few hundred bucks , Data Recovery Firms charge in the $Thousands.

As I have said - this has nothing to do with a data recovery. Smiley You are screwed if there is no known solution (i.e. decryption). No matter if you send to a firm or to CIA/FBI.
legendary
Activity: 1400
Merit: 1001
August 20, 2016, 03:34:07 AM
#16
I hope it will never happen. I mother was a victim of a ransomware called CryptoWall. And I can tell you it is not funny nor proper to talk like creating this shit is a good business.
I never paid anything and I never will to any of these bastards behind it. It was the first time I regretted that Satoshi invented bitcoin, don't make me do this again.
legendary
Activity: 1092
Merit: 1000
August 20, 2016, 03:28:14 AM
#15
Hmm,

Hackers that are doing ransom-ware with BTC, mainly the following reasons,

One it is easier for their victims to get ,
Easier for them to mix,

However we can't confirm that they don't use altcoins during the mixing process, because they might.
But the final conversion would be in BTC as more places to convert it back into Fiat, which is their main goal anyway.
(They used to have people send money from 7-eleven stores using money gram before they switched to BTC)
https://7elevenmoneytransfer.com.au/

As far as the arrival mechanism , lately they have been sending out mass emails, claiming to be an invoice in a Word Document.
User open the word doc, which triggers a Macro which downloads and triggers the virus.
The Virus runs in the background, and many users report the PC feeling slow or sluggish, once all of the files are encrypted,
It pops up on the screen with the ransom.

I seen a few different versions of this ransomware bugger.

1. User Workstation was hit and it encrypted every word, excel, picture on that PC and all of the server drives it had access too.  Tongue
Removal of the virus is simple, as it work was done, luckily the company was professional and kept a nightly backup.
Restored the Server Backups, and they were up and running the next day.  Cheesy
(PC was Reformatted)

2. Another User at another company was tricked into loading a trojan word file.
It also encrypted all files on the workstation and server.
Server was restored from the previous night's backup,
however there were no backups for all of the files that were being kept on the PC.  Tongue
But they got lucky, this version of ransomware , did not delete the Shadow copies created by windows.
User lost ~2 days worth of work verses 3 years.

But there are newer versions that delete those shadow copies first, so that recovery option may not be possible.

Moral of the story a weekly backup to a drive that is not left connected to your PC will save your butt.
Not just from ransomware, but from hard drive failures.
Ransom guys charge a few hundred bucks , Data Recovery Firms charge in the $Thousands.

A 1TB USB drive is under $80 , It is the Cheapest Insurance you can buy for your Data.  Smiley

 Cool

FYI: Tips
If the User has no backups,
Place the Hard drive in a Secure System and make a data recovery image with something like GetDataBack software.
Then you can scan the image for any deleted files.
Then clean the virus from the hard drive, place back in original system and check to see if any shadow copies are available.
http://www.shadowexplorer.com/
If all of those fail, then the users may pay the ransom, but get them setup with a backup procedure so it never happens again.
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 20, 2016, 03:02:17 AM
#14
Hell look at the cost of PC repair at your local stores.. they are not cheap.

That's has nothing to do with the ransomware viruses. Last year I have dealt with 2 computers, which were infected with the same ransomware (they were not in the same network, they were even in different towns) and there was no solution other than to pay. Many of these viruses are using 256 bit encryption, which is pretty much impossible to be broken. To understand this better, a computer with a performance of 30 petaflops (i.e. - capable of 30,000 billion floating point operations per second) would need more than 10 years to decrypt it.   
legendary
Activity: 1540
Merit: 1011
FUD Philanthropist™
August 20, 2016, 02:46:56 AM
#13
Maybe on a later future they could ask for LTC, Ethereum (ETH or ETC) or whatever. It is quite possible.

P.S. I think that the first ransomware was CryptoLocker and the creator was found to be a russian hacker so, yes, you could say that ransomware's origin is Russia.
P.S.2 I did read the article, but I could send you 10 FAIL coins as I don't think I was infected by your ransomware. Grin

Why not the hackers ask for Monero or Bytecoin. These are more anonymous coins and are more difficult to trace the usage.

I guess because it's already rather difficult for a not-so-tech-savvy user to buy bitcoin, let alone bytecoin or monero. If they would ask these coins, i guess more of their victims wouldn't be able to ackquire the ransom even if they wanted to. (just my opinion tough).

Bitcoin is allmost impossible to trace IF you know what you're doing... You can go trough 1 or 2 mixers, use an online casino with a central wallet, go trough some exchanges to exchange the "tainted" BTC into a more anonymous coin => send it to a different exchange => exchange it back to BTC, buy freshly mined coins from a miner for a premium fee,... All this can be done over a mix of trusted VPN's, trusted proxy's, TOR on public wifi's... I'd like to see a gov agency trace BTC from a user that actually knows how to break the link.

Ya good point !

I also did post a link to that recent story where they mentioned BTC "mixing"
Apparently they are getting away with it and those criminals are hard to catch.

And some pay because they have no choice.
Imagine people use their PC's for anything.
So if you had your life's work on there and had to pay $600 to get it back.. many end up paying !
Hell look at the cost of PC repair at your local stores.. they are not cheap.
So from a victims perspective i don't think they would worry about it that much. (the money)
Plus how much money you make ?
If your work on your PC saved was worth a lot for a big company where you made a lot.. you may not care about paying.

I just wonder if Altcoins will end up being more common with them in the future.

So far i have no experience with them.. just seen them mentioned lots in the news.
I heard before they make something like 350 million year and climbing.
SO..
As time goes on we are all facing a larger risk of getting hit by one !
And the silence in the Altcoin scene + Ransomware is deafening.. i doubt it will stay that way too.

Watch your backs people.
I seen one written in Javascript the News story said LOL
Ya Javascript like as used in web pages.. (not Java)

If a new coin launches here with one it could be ugly.
Or if an existing one is updated with malicious code..

Don't forget this HAS happened here more than once with various malware that included Keyloggers.
Users here HAVE had their wallets cleared out after getting hit with an infected coin wallet.
So don't take these risks lightly !

ME ?
I wouldn't pay.
I prob couldn't afford it and if i could i wouldn't do it anyway.
I would just reformat my PC and pull out my install disc and sadly start all over again.
Over the years i have had some stuff backed up so i would not have to start out from scratch.
Much of "my stuff" i can get again.. like downloaded TV shows or Music / Pictures.
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 19, 2016, 06:12:53 AM
#12
Why not the hackers ask for Monero or Bytecoin. These are more anonymous coins and are more difficult to trace the usage.

Maybe because many people still don't know anything even about Litecoin, which was like the 8th cryptocurrency after Bitcoin.
hero member
Activity: 675
Merit: 504
August 19, 2016, 06:05:44 AM
#11
Maybe on a later future they could ask for LTC, Ethereum (ETH or ETC) or whatever. It is quite possible.

P.S. I think that the first ransomware was CryptoLocker and the creator was found to be a russian hacker so, yes, you could say that ransomware's origin is Russia.
P.S.2 I did read the article, but I could send you 10 FAIL coins as I don't think I was infected by your ransomware. Grin

Why not the hackers ask for Monero or Bytecoin. These are more anonymous coins and are more difficult to trace the usage.

I guess because it's already rather difficult for a not-so-tech-savvy user to buy bitcoin, let alone bytecoin or monero. If they would ask these coins, i guess more of their victims wouldn't be able to ackquire the ransom even if they wanted to. (just my opinion tough).

Bitcoin is allmost impossible to trace IF you know what you're doing... You can go trough 1 or 2 mixers, use an online casino with a central wallet, go trough some exchanges to exchange the "tainted" BTC into a more anonymous coin => send it to a different exchange => exchange it back to BTC, buy freshly mined coins from a miner for a premium fee,... All this can be done over a mix of trusted VPN's, trusted proxy's, TOR on public wifi's... I'd like to see a gov agency trace BTC from a user that actually knows how to break the link.
full member
Activity: 151
Merit: 105
August 19, 2016, 05:55:09 AM
#10
Maybe on a later future they could ask for LTC, Ethereum (ETH or ETC) or whatever. It is quite possible.

P.S. I think that the first ransomware was CryptoLocker and the creator was found to be a russian hacker so, yes, you could say that ransomware's origin is Russia.
P.S.2 I did read the article, but I could send you 10 FAIL coins as I don't think I was infected by your ransomware. Grin

Why not the hackers ask for Monero or Bytecoin. These are more anonymous coins and are more difficult to trace the usage.
legendary
Activity: 1960
Merit: 1176
@FAILCommunity
August 19, 2016, 05:05:43 AM
#9
Most people (hackers included) still don't know that Bitcoin is not anonymous and can be traced.

Of course the hackers know that... Smiley
If they do,why do the demand ransom in bitcoin http://m.healthcareitnews.com/news/medstar-attack-found-be-ransomware-hackers-demand-bitcoin

I think that there are a lot of ways to cover yourself.


On a second thought, hackers are usually active internet users and it is highly unlikely that they are unaware of bitcoin traceability

Sure, that is why I've said they are aware of that.
full member
Activity: 124
Merit: 100
August 19, 2016, 04:58:15 AM
#8
Most people (hackers included) still don't know that Bitcoin is not anonymous and can be traced.

Of course the hackers know that... Smiley
If they do,why do the demand ransom in bitcoin http://m.healthcareitnews.com/news/medstar-attack-found-be-ransomware-hackers-demand-bitcoin
On a second thought, hackers are usually active internet users and it is highly unlikely that they are unaware of bitcoin traceability
legendary
Activity: 1498
Merit: 1117
August 19, 2016, 04:52:32 AM
#7
i wonder anyone really pays money to the ransomware? Definitely they will blackmail again even after they paid.

people pay. and they pay because the get their data back. this system only works when the "hacker" really gives you the key after you have payed.
Pages:
Jump to: