
@Mark thats probably the best , but i was talking of being proactive and how not to get hit , but also remember some ransonware can lay in wait till its activated (delayed attack) https://forums.malwarebytes.org/index.php?/topic/134999-quick-qustions-about... https://nakedsecurity.sophos.com/2013/11/04/cryptolocker-ransomeware-crooks-... http://www.reddit.com/r/Malware/comments/2tgqp8/new_software_to_detect_encry... On Mon, Feb 9, 2015 at 9:25 AM, Mark Kipyegon via skunkworks < skunkworks@lists.my.co.ke> wrote:
On 09/02/2015 08:35, geoffrey gitagia via skunkworks wrote:
Best way to deal with crypto ware ... pay the guy , decrypt , painfully backup each file and folder to a clean drive (this step makes sure you dont copy over the infecting file) , format your drive , restore only important files from the backup drive ... Please note that not many antiviruses (if any) know how to deal with these.
This is bad advice IMO.
Automatic backups are fairly easy to setup and paying the ransom shouldn't even be considered.
_______________________________________________ skunkworks mailing list skunkworks@lists.my.co.ke ------------ List info, subscribe/unsubscribe http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------
Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- GG