Jump to content

Archived

This topic is now archived and is closed to further replies.

Juliet

legitimate web sites and source of infection

Recommended Posts

http://www.bleepingcomputer.com/forums/t/532879/cryptowall-new-variant-of-cryptodefense/page-41?do=findComment&comment=3524876

 

Prevention Tips for Ransomware/Crypto malware:

 

1. Do not open email attachments from an unknown or unsolicited sources). Crypto malware can be disguised in email attachments which appear to be legitimate correspondence from reputable companies such as banks and Internet providers or UPS or FedEx with tracking numbers. Attackers will use email addresses and subjects that will entice a user to read the email and open the attachment...see here.

 

2. Do not open Office documents with embedded macro as they can be infected...see here.

 

3. Do not click links in an email message, an instant message or on a social networking site. If the link is malicious, you can be redirected to a compromised site and become infected by exploit kits and drive-by downloads.

 

4. Turn on file extensions in windows so that you can see extensions. Ransomware disguises .exe files as PDF files inside a .zip file attached to the email. These disguised files have a PDF icon and are typically randomly named. Since Microsoft does not show extensions by default, they look like normal PDF files and people open them.

 

5. Follow Best Practices for Safe Computing when browsing the web. Important Fact: It has been proven time and again that the user is a more substantial factor (weakest link) in security than the architecture of the operating system or installed protection software.

 

6. Read US-CERT Alert (TA13-309A) Ransomware Infections for more prevention tips,

 

7. Backing up your data and disk imaging are among the most important maintenance tasks users should perform on a regularly, yet it's one of the most neglected areas.

 

Ransomware Prevention Tools:

Share this post


Link to post
Share on other sites

×
×
  • Create New...