ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > General Software Discussion

Interesting Approach by the Profiteering Malware Author

<< < (2/6) > >>

Carol Haynes:
Can't the money trail be traced if people are paying?

Solution - backup up regularly and tell him to go f*** himself.

Darwin:
Why am I suddenly in support of waterboarding?  ;)
-40hz (June 11, 2008, 10:13 AM)
--- End quote ---




As Carol says, backup, backup, backup... To combat this sort of instanity, I suppose this means that disk imaging is the best way to go.

nosh:
I'm sure the description of the malware that hit the DC server said it did something very similar. Apparently there weren't any casualties but if these clowns could generate effective code maybe they would have got a _real_ job?

Darwin:
if these clowns could generate effective code maybe they would have got a _real_ job
-nosh (June 11, 2008, 11:01 AM)
--- End quote ---

 ;D Very true. Still, it never hurts to OVERestimate your enemy.

CWuestefeld:
<cynicism>Oh, and that it makes for a great news story to plug your antivirus product.</cynicism>
-Renegade (June 11, 2008, 09:31 AM)
--- End quote ---
I'm a Kaspersky fan, but I have to agree. It seems that cracking the key is impractical, and even if it weren't, it is trivial for the bad guy to release a new version using a new key, so this approach won't work. And why is it so difficult to catch the key with a debugger, as f0dder suggested?

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version