Уважаемые пользователи Голос!
Сайт доступен в режиме «чтение» до сентября 2020 года. Операции с токенами Golos, Cyber можно проводить, используя альтернативные клиенты или через эксплорер Cyberway. Подробности здесь: https://golos.io/@goloscore/operacii-s-tokenami-golos-cyber-1594822432061
С уважением, команда “Голос”
GOLOS
RU
EN
UA
mrosenquist
7 лет назад

Relief for Jaff Ransomware Victims

Kaspersky Labs has updated their ransomware decryptor tool to include Jaff ransomware (v1.21.2.1).  This is great news for those who have become a victim of Jaff and are wondering if they must pay the hefty ransom (thousands of dollars’ worth of bitcoin). This free tool, from one of the top anti-malware companies, is available at https://support.kaspersky.com/viruses/disinfection/10556    

Back in May, the Jaff ransomware was spreading at a rate of 5 million per hour. It is similar to the Locky variant but has a higher ransom. Infection occurs via a malicious email attachment, usually a PDF document, that opens an embedded Microsoft Word file containing a macro script. This macro, if allowed to run, downloads and executes the payload.   

Multi-Use Tool 

The Rakhni Decryptor can be used to decrypt files that have been altered by the following types of ransomware variants: 

  • Win32.Rakhni 
  • Win32.Agent.iih 
  • Win32.Autoit 
  • Win32.Aura 
  • AndroidOS.Pletor 
  • Win32.Rotor 
  • Win32.Lamer 
  • Win32.Cryptokluchen 
  • Win32.Democry 
  • Win32.Bitman version 3 and 4 
  • Win32.Libra 
  • MSIL.Lobzik 
  • MSIL.Lortok 
  • Win32.Chimera 
  • Win32.CryFile 
  • Win32.Nemchig 
  • Win32.Mircop 
  • Win32.Mor 
  • Win32.Crusis 
  • Win32.AecHu 
  • Win32.Jaff   

The detailed instructions are on the site. It is somewhat technical, so take your time and do it right. This may be your only opportunity to recover your files without paying your attackers.    

To Avoid the Pain 

Prevention is better than a cure. To avoid Jaff and others like it, follow these three steps: 

  1. Don’t open or download files from unknown or untrusted sources. Just don’t do it. You know better. 
  2. Make sure macros are disabled in all your Microsoft Office applications. They are being heavily abused by attackers.  
  3. Install and keep current a trustworthy and comprehensive anti-malware suite from an industry leading security software company. This should include anti-virus, email and web protections, firewall, and even some type of sandbox capability to test files in a safe environment. 
  4. (bonus) Make sure your important files are backed-up regularly and stored off-line. Although not prevention, in the event you find yourself in the middle of a catastrophe, you will be glad your most treasured data is still safe and accessible.      

For cures to other ransomware variants, check out the free tools at nomoreransom.org provided by industry leading cybersecurity software companies.      


Interested in more? Follow me on LinkedIn, Twitter (@Matt_Rosenquist), Information Security Strategy, Golos, and Steemit to hear insights and what is going on in cybersecurity.  

0
0.113 GOLOS
Комментарии (3)
Сортировать по:
Сначала старые