[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Ransomware meets Linux - on the command line!

On 11/11/2015 10:24 PM, Cindy-Sue Causey wrote:


> Brian Krebs of Krebs On Security had
> something on ransomware and Linux, just not labeled Ransm-C or
> anything:
> http://krebsonsecurity.com/2015/11/ransomware-now-gunning-for-your-web-sites/
> IF I'm understanding correctly, he appears to have updated that
> article with a *potential* way to beat it via a *potential*
> vulnerability.... at least until the perpetrators upgrade their own
> tactics, anyway.
> I like what Brian's been doing. I can cognitively understand a LOT of
> what he writes about. He's caught SlashDot's eye a time or two, too.
> Adding another keyword here, Linux.Decoder.1, which Brian says was a
> name dubbed by "Russian antivirus and security firm Dr.Web". It may or
> may not be the same as the other, but sounds like it works
> similar'ISH.
> Next stop is to pop over to a group called BlindWebbers. I'd seen
> Brian's email subject line earlier and thought instantly of them, just
> didn't get around to opening it then. The guy in Brian's article makes
> it sound like it's a little time consuming and still has incidental
> glitches afterwards.
> That's presumably coming from someone with no visual disabilities. The
> difficulty level of getting one's website back would understandably
> rise relative to one's ability or lack thereof to actually see what's
> going on within the file hierarchy..... AND apparently each single
> file that reportedly stands to potentially gather random bits AFTER
> the files have been decrypted.

As a user, I too, find Krebs informative.  Also notable was this recent
Washington Post article about Linus Torvalds and Linux security:


"Fast, flexible and free, Linux is taking over the online world. But
there is growing unease about security weaknesses."


Attachment: signature.asc
Description: OpenPGP digital signature

Reply to: