Go Back  FlyerTalk Forums > Travel&Dining > Travel Technology
Reload this Page >

Hacked By Ransomware

Community
Wiki Posts
Search

Hacked By Ransomware

Thread Tools
 
Search this Thread
 
Old Nov 21, 2013, 5:03 pm
  #31  
Original Poster
 
Join Date: Apr 2006
Location: New York City/NY22
Programs: AA Platinum 2.3MM (Lifetime PLT)
Posts: 5,285
How long woud you keep running this program?

Computer has an i7-740QM processor with a 256 GB SSD that is probably 90% full.

Here are the instructions I received from McAfee:

Create a folder in the root drive [C:] with the name “Scan” and download the zip file which has the “scan.exe” from the below link:

http://www.mcafeeasap.com/downloads/...32-6.0.1-l.zip


• Then download another zip file which has the latest “Beta Dat” files from the below link:

http://vil.nai.com/vil/virus-4d.aspx [Please select the file with the name “avvwin_netware_betadat.zip”]


Extract:

• Once the zip files downloaded, extract the “vscl-w32-6.0.1-l.zip” in the scan folder.
• Then extract the “avvwin_netware_betadat.zip” in the same folder.
• Move the files from the “vscl-w32-6.0.1-l” to the scan folder.
• Then move the files from “avvwin_netware_betadat” to the same scan folder.

NOTE: Please click on “Replace all” to replace the old dat files to the new one.

Create .bat file:

• Once the files extracted, follow the steps below to create a batch file to run the Command-line scan:
• Open a notepad and copy the command given below:

c:\scan\scan.exe /clean /all /adl /program /winmem /unzip /report c:\scan\scan-rpt.txt /rptall

• Save the notepad in the root drive [C:] with the name and extension as “Scan.bat”

Execute the scan in safe mode with command prompt:

Boot the computer in the safe with command prompt by tapping the F8 key while restarting the computer and selecting safe mode with command prompt in the advanced boot menu.

• Type the commands given below to start the SDAT scan:

Type cd\ and press enter.
Then type C:\Scan.bat and press enter.

• It will start the scan will take approximately 2-3 hours to complete the scan.
This has been running for 19 hours straight! No clue from McAfee on the phone what to do.

Opinions?
Landing Gear is offline  
Old Nov 21, 2013, 5:13 pm
  #32  
FlyerTalk Evangelist
 
Join Date: Oct 2005
Location: Somewhere between here and there...
Programs: WWF, Appalachian Mountain Club
Posts: 11,595
Originally Posted by Landing Gear
My takeaway as well is to upgrade Malwarebytes to the "pay" version. I hear this might have helped.
Then unfortunately you just haven't learned. There's no substitute for frequent backups.

Repeat...

There's no substitute for frequent backups.
tkey75 is offline  
Old Nov 21, 2013, 5:20 pm
  #33  
FlyerTalk Evangelist
 
Join Date: May 2002
Location: Pittsburgh
Programs: MR/SPG LT Titanium, AA LT PLT, UA SLV, Avis PreferredPlus
Posts: 31,010
Originally Posted by boberonicus
What interests me is that these attacks are on the rise and extortion like this would clearly seem to be a felony, but I guess most prosecuting attorneys are uninterested in complex property crimes.
It's pretty hard to prosecute someone when you have no idea who they are, as they are using very sophisticated domain generation algorithms. There is far from a lack of interest. US-CERT and FBI-ICCC are working it rigorously.
CPRich is offline  
Old Nov 21, 2013, 6:15 pm
  #34  
 
Join Date: May 2010
Posts: 542
Originally Posted by Landing Gear
My primary laptop was just hacked by ransomware. I am no sure if this is the kind I heard about recently on CNBC. I don't know if it has encrypted my files or is just blocking my computer.

The are demading $300 by MoneyPak or MoneyGram within 48 hours.

Any helpful advice will be appeciated. Please do not tel me I should have a Mac. That's not very hepful.

Note: I have and use regularly McAfee, Malwareytes (the free version) and SuperAntiSpyware (also the free version).
Just keep in mind if you miss the deadline, the price may go up to $4,000.

Have you tried contacting their customer service to see what your options are?

The encryption the hackers to secure your files is very difficult to defeat. Seriously, this is a business now.

http://www.today.com/money/cryptoloc...ims-2D11586019
NauticalWheeler is offline  
Old Nov 21, 2013, 6:21 pm
  #35  
Original Poster
 
Join Date: Apr 2006
Location: New York City/NY22
Programs: AA Platinum 2.3MM (Lifetime PLT)
Posts: 5,285
Originally Posted by tkey75
Then unfortunately you just haven't learned. There's no substitute for frequent backups.

Repeat...

There's no substitute for frequent backups.
There is absolutely no need for this condescension.
Landing Gear is offline  
Old Nov 21, 2013, 6:21 pm
  #36  
 
Join Date: Feb 2012
Posts: 573
I am very sorry this happened to you.

Do you know how it happened?
MareLuce is offline  
Old Nov 21, 2013, 6:48 pm
  #37  
 
Join Date: Jul 2012
Location: @LAS
Programs: Concorde Connoisseur, ua 1mm
Posts: 152
Originally Posted by Camarones
Not just that... Frequent backups to a destination that is normally disconnected from your computer. Thankfully the current iterations of cryptolocker only prowl drive letters and not UNC shares. But if you have mapped network drives your system could be a conduit to a lot of destruction.
True, however, just backup your files to a traditional medium (cd, dvd, tape
etc, i.e. something not random access) once in a while. Problem solved.
hamburgoflyer is offline  
Old Nov 21, 2013, 6:49 pm
  #38  
 
 
Join Date: Nov 2000
Location: Upcountry Maui, HI
Posts: 13,312
Originally Posted by Landing Gear
There is absolutely no need for this condescension.
Do you have unencrypted backups of the files you need to recover from that computer?

Do you understand that if your files are encrypted and you do not have unencrypted backups of the important files you should not remove the malware until your files are decrypted? The malware is the only thing that will decrypt them. Removing the malware will not decrypt your files.

Just making sure you understand this since you are running that McAfee thing.

-David
LIH Prem is offline  
Old Nov 21, 2013, 6:55 pm
  #39  
 
Join Date: Jun 2001
Location: A small town in North Georgia
Programs: DL Platinum Medallion, AA
Posts: 1,627
Landing Gear,
If you look at the web site for consumer radio show host Clark Howard and search for ransom ware, you will find a lot of information and solutions.
www.clarkhoward.com
Georgia Peach is offline  
Old Nov 21, 2013, 6:59 pm
  #40  
 
Join Date: Nov 2005
Location: SIN / SFO
Programs: UA GS, SQ PPS, Hyatt Globalist, Marriott Titanium, Hilton Diamond, Accor Gold
Posts: 1,217
If you are unfortunate enough to have picked up a CryptoLocker infestation, there is no known way to recover your data short of paying the ransom. Be careful as the price goes up substantially if you do not pay by their initial deadline. On the other hand, if you were lucky (a relative term here) enough to catch some other ransomware variant that does not actually encrypt your data, you should be able to recover your documents without paying.

As others have said—and this is not intended to be condescending—regular backups are critical as they provide an extremely simple solution to these types of issues. Unfortunately, most people do not realise just how valuable a backup can be until after they already need one.

Good luck.
Scifience is offline  
Old Nov 21, 2013, 7:11 pm
  #41  
 
Join Date: Jun 2004
Location: Anchorage, AK
Programs: Lifetime AS 1MM & MVPG, AS MVPG100K, AA, DL, HH-G
Posts: 8,259
I don't know if this will help, but I got this virus about a year ago. I had set up a second account on my PC that I accessed and reset the computer to a previous restore point, prior to the virus. It went away and has not been back, yet......

In my case, it blocked me from using the computer. It would run for about a minute but then a ransom message popped up. It did not go after any files AFAICT.

Geek Squad basically told me to wipe out the hard drive & start over again. I was not willing to do that.

Last edited by BOB W; Nov 21, 2013 at 7:30 pm
BOB W is offline  
Old Nov 21, 2013, 7:18 pm
  #42  
FlyerTalk Evangelist
 
Join Date: Oct 2005
Location: Somewhere between here and there...
Programs: WWF, Appalachian Mountain Club
Posts: 11,595
Exactly. My reply was not meant to be condescending. It just appears the simplest, cheapest, most foolproof solution is escaping you. Its hindsight now as you did not have a backup, but investing in new anti-malware software is just not the way to ensure you do not have this problem again.

If I had a dime for every time the answer was 'Huh?' To someone saying to me 'Hey Tkey, it seems I've an issue here' and my very first question is 'Where's your backup'...
tkey75 is offline  
Old Nov 21, 2013, 7:26 pm
  #43  
 
Join Date: Jul 2012
Location: @LAS
Programs: Concorde Connoisseur, ua 1mm
Posts: 152
Originally Posted by Landing Gear
This has been running for 19 hours straight! No clue from McAfee on the phone what to do.

Opinions?
If I were you, I'd boot linux from a cd/dvd, mount the windoze partition
and copy your files to a usb hd and start over with a fresh windoze.

Or better yet, use ubuntu while it has its own quirks (but fewer) the
amount of malware out there to get you is orders of magnitude smaller.
hamburgoflyer is offline  
Old Nov 21, 2013, 7:27 pm
  #44  
FlyerTalk Evangelist
 
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
Originally Posted by BOB W
I don't know if this will help, but I got this virus about a year ago. I had set up a second account on my PC that I accessed and reset the computer to a previous restore point, prior to the virus. It went away and has not been back, yet......

Geek Squad basically told me to wipe out the hard drive & start over again. I was not willing to do that.
A system restore will not restore data files, e.g. Word documents, Excel spreadsheets, etc.

As for Geek Squad, don't waste your time or money -- my wife knows more about computers and she doesn't know anything about computers.
PTravel is offline  
Old Nov 21, 2013, 8:02 pm
  #45  
 
Join Date: Jan 2013
Location: Hawai'i Nei
Programs: Au: UA, Marriott, Hilton; GE
Posts: 7,147
Does anyone know whether these Ransomeware bugs, once in one's system, affect backups in cloud storage too?
747FC is offline  


Contact Us - Manage Preferences - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service -

This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.