• Effective immediately we will be deleting, without notice, any negative threads or posts that deal with the use of encryption and streaming of scanner audio.

    We've noticed a huge increase in rants and negative posts that revolve around agencies going to encryption due to the broadcasting of scanner audio on the internet. It's now worn out and continues to be the same recycled rants. These rants hijack the threads and derail the conversation. They no longer have a place anywhere on this forum other than in the designated threads in the Rants forum in the Tavern.

    If you violate these guidelines your post will be deleted without notice and an infraction will be issued. We are not against discussion of this issue. You just need to do it in the right place. For example:
    https://forums.radioreference.com/rants/224104-official-thread-live-audio-feeds-scanners-wait-encryption.html

Cyptrolocker

Status
Not open for further replies.

Medic115

Member
Joined
Jan 24, 2007
Messages
42
If you get a message from your Mal-ware (if you are lucky) about cyropto locker or spelling variants.
My son works in computer consulting and networking and the virus clean up that is normal with business computers. It works on hard wire systems and WiFi.
CYRO, CYPTRO or other variant spellings, be very careful.
Kaspersky 2014, Microsoft, and all the popular freeware virus and mal-ware will not pick it up.
My son, under controlled a controlled situation today ran this from a customers computer.
It scans and starts logging and reporting back to One of it's masters. Each master reports back to it's master and so on. This is the type of system who breached Target's software.
Your average virus mal-ware software can't defeat this.
It takes a root format, or dod wipe of the drive.
This stuff is crazy, It mines for all IP's and mac addresses on a computer to infect them all to mine information.
A demo from my son showed this in action scared me
I can't post video due to his work restrictions, But this is bad stuff.
Long post but need for everyone to know.
 

NHdave

Member
Premium Subscriber
Joined
Oct 18, 2011
Messages
386
Location
Southeast NH, USA
This is the type of system who breached Target's software.
No it's not.

It takes a root format, or dod wipe of the drive.
No it doesn't

This is old news, but crypto locker does just what it's name implies, encrypts your personal files and demands ransom to get them back. The infection itself is quite easy to remove, by no means is any type of format required.
 

poltergeisty

Deep Thinker
Joined
May 7, 2004
Messages
3,809
Location
RLG, Fly heading 053, intercept 315 DVV
Here's another tool to prevent Cryptolocker. YMMV, I haven't used it.

Becasue of the way the url is named it masks it. So I have to link it here in a code box.

Code:
http://www.fooli****.com/vb6-projects/cryptoprevent/
Well, as you can see that doesn't work either. Just Google CryptoPrevent.
 
Last edited:

fxdscon

Active Member
Premium Subscriber
Joined
Jan 15, 2007
Messages
3,915
Sounds like the OP's son who

"works in computer consulting and networking and the virus clean up that is normal with business computers",

was quite mis-informed!

.
 

questnz

Member
Joined
Nov 18, 2009
Messages
548
Location
Somwhere in South Pacific
Aye, NHdave summarized this already, there seems to be confusion from some "experts" about the difference between removing Ransom-ware and kissing your encrypted files good bye without restoring from good backup. There is no need to Nuke HD with Dban or similar software, bit drastic measure!
 
Last edited:

questnz

Member
Joined
Nov 18, 2009
Messages
548
Location
Somwhere in South Pacific
Hey you are absolutely right as already been commented on, many ways to remove Ransomware, this is easy bit, you just "rescue" the OS and the some HD content, get the encrypted files back with encryption key residing "out in the wild" is the impossible task. The money is in the data part.
 
Status
Not open for further replies.
Top