This is poor strategy no matter how you care to describe it..Yeah? And WHO're you & WHAT did you do instead commenting other's works, huh?
We don't need a commentator, we need a DO-ER! So, butt off !!
A forum for reverse engineering, OS internals and malware analysis
This is poor strategy no matter how you care to describe it..Yeah? And WHO're you & WHAT did you do instead commenting other's works, huh?
By the way you sent an email.. want a cookie?I asked: "So what did you do?" < A simple plain english..
unixfreaxjp wrote:though this discussion is purely off the topic, i love where it goes. :DAnd FYI. No locker survived in JP and think AGAIN why..
TheExecuter wrote: this variant crilock you actually destroyed those PC's which people could have payed and retrieved their systems back.This is sort of advice to all victims of this encoder?
I agree that client-server type encoders must be considered differently than other ransomware but paying ransom is actually bad idea in any case.↑ I am with you all the way on this thought! A+!
TheExecuter wrote:victims can only pay and retrieve their stuff, if they don't have a backup.Well for the beginning. Guys behind encoders cannot be consider as "good" or whatever. They even not cyber-criminals, they must be considered as sort of cyber-terrorists.
though it won't affect much a high school kid it would affect people who work in an office too much that paying money seems better than reconstructing tons of people's work.
tjcoder wrote:It's a flux network being fed by multiple PPI and spam campaigns, good luck with that..WRONG!! Do not making LIES of research's fact here! CABIN.SU was an FF for round robin only 12 limited specific scattered Ukrainian(mostly)-US(two of them) uniq IP (which obviously understandable why they need specific machine for it), too small to be called "A NETWORK"! Doh! Did you milk the IP? Or read prev. posts/references? Naaah, likely..
tjcoder wrote:P.S. those flux nodes you 'took down' have been syncing a new domain for days now..And do you think I didn't notice that too? Guess why I didn't mention it? Ever you "think"?
tjcoder wrote:Anyone who didn't get to pay inside that <48 hour window still have to pay, they just have to pay a fee in addition now.. Nice strategy security expert.. You increased the operators profit margin..Read what @EP_X0FF's kindly long-written wisdom in here --> http://www.kernelmode.info/forum/viewto ... 110#p22133 < Coz I won't be that nice to you.
EP_X0FF wrote: We have obvious strategy here -> active infiltration, gathering data about people who behind this and acting together with police, just like was in case of Reveton (despite the fact it was different type of ransomware). Simple domain shutdown here is ineffective and counterproductive as this data maybe required to law enforcement actions.