Apparently it's the library's turn to pay a fine.
Libraries in St Louis have been bought to a standstill after computers in all the city's libraries were infected with ransomware, a particularly virulent form of computer virus used to extort money from victims.
Hackers are demanding $35,000 (£28,000) to restore the system after the cyberattack, which affected 700 computers across the Missouri city's 16 public libraries. The hackers demanded the money in electronic currency bitcoin, but, as CNN reports, the authority has refused to pay for a code that would unlock the machines.
As a result, the library authority has said it will wipe its entire computer system and rebuild it from scratch, a solution that may take weeks.
(Score: 2) by number6 on Wednesday January 25 2017, @03:56PM
[Assuming the target is a computer running a Windows OS]
If I had backups of these files from the system drive (generated once a week by a scheduled task):
- The master file table (MFT)
- The master boot record (MBR)
- The system Registry hives: "DEFAULT | SAM | SECURITY | SOFTWARE | SYSTEM"
- The userprofile Registry hive: "NTUSER.DAT"
- The system file: "BOOT.INI"
Is it always possible to recover from ransomware attacks?
If it is not always possible to recover from ransomware attacks, then what am I missing to make this (simple) system recovery strategy resistant to ransomware?
I went to Wikipedia and had a look at the article on Ransomware (.https://en.wikipedia.org/wiki/Ransomware) and noticed that the more vicious strains of Ransomware like to encrypt the filesystem.
Technically, what exactly does "encrypt the filesystem" mean? What files or objects or things are being touched? How exactly does this process cascade? Is there some simple way of mitigating the process (apart from cloning the drive)?
The simple strategy of backing up those system files I mentioned above has actually saved me many times.
However, if I was an organization or I gave more of a shit about this, I would also be installing the program "Deep Freeze" (www.faronics.com) which would roll the system back to a snapshot state on every reboot.
--
Q: "So how do you back up all those system files while your OS is running, how do you overcome 'access denied' messages"?
A: I use this command-line tool which copies raw sectors off the disk, bypassing the operating system handles:
--
Q: "What other tools do you use"?
A: These are useful to have in the kit:
(Score: 2) by Scruffy Beard 2 on Wednesday January 25 2017, @04:50PM
"Encrypt the filesystem" means that they scramble all of the files the user has access to in a specific way that only the attacker knows how to reverse.
This can include online backups.
(Score: 0) by Anonymous Coward on Wednesday January 25 2017, @05:05PM
That is why I pull backups, not push them.
(Score: 2) by Gaaark on Wednesday January 25 2017, @05:24PM
I always pull back.
But then i push forward again.
Then i do it again. And again.
It's fun.
Wait. What are we talking about?
--- Please remind me if I haven't been civil to you: I'm channeling MDC. I have always been here. ---Gaaark 2.0 --
(Score: 1) by Scruffy Beard 2 on Wednesday January 25 2017, @08:04PM
I think pushing via sneakernet can be secure.
(Score: 2) by tibman on Wednesday January 25 2017, @06:55PM
For backups i would suggest you focus on your actual data and not operating system files. Reinstalling windows is no big deal and something that has to be done periodically anyways. If you want to preserve your OS then i'd suggest doing a full-disk backup and not selective OS files. If you get some kind of malware then you really should format and reinstall. The malware could have put in a rootkit that you can't even see. Linux is a little different, imo. If you can verify they never had root and couldn't escalate then a clean-up is fine. I still reformat though : )
SN won't survive on lurkers alone. Write comments.