|
此文章由 fly_cat 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 fly_cat 所有!转贴必须注明作者、出处和本声明,并保持内容完整
本帖最后由 fly_cat 于 2016-4-5 15:47 编辑
Leetecit 发表于 2016-4-5 15:12 
为啥会这么容易呢,用户/病毒如何取得Admin权限?而且了解一下你们公司用哪个firewall? ...
您狗一下CryptoLocker,他只需要用户当前权限,把用户可以访问所有文档,包括服务器映射的网络驱动器,比如jpg,doc,xls,pdf等等全部加密,然后把秘钥传走。给你留一封readme,让你联系他们,付比特币,给你密钥解密,该病毒已经出到第4版。狗后,你会发现没有厂家提供够好的防范措施。有人甘心付了1000美刀换回自己多年的照片。你能不让用户编辑自己的my documents吗?
我们服务器有备份,无所谓,只是花些时间恢复。你想想你自己家的NAS,要是被搞掉了,你舍不舍得花1000美刀?有多少人给自己的电脑定期做备份?比特币无处追踪,报警也没用。
粘一段一个security solution website的建议:
http://www.pandasecurity.com/mediacenter/malware/cryptolocker/
How to avoid CryptoLocker
This malware spreads via email by using social engineering techniques. Therefore, our recommendation are:
•Being particularly wary of emails from senders you don’t know, especially those with attached files.
•Disabling hidden file extensions in Windows will also help recognize this type of attack.
•We’d like to remind you of the importance of having a backup system in place for your critical files. This will help mitigate the damage caused not only by malware infections, but hardware problems or any other incidents as well.
•If you become infected and don’t have a backup copy of your files, our recommendation is not to pay the ransom. That’s NEVER a good solution, as it turns the malware into a highly profitable business model and will contribute to the flourishing of this type of attack.
提高用户对于scam email的安全意识是根本,其他措施都是补救。 |
|