You are viewing a single thread.
View all comments View context
11 points

The advice I’ve always heard is disconnect network but leave powered for forensics/recovery. Some ransomware store the decryption key soley in memory, so it is lost upon power loss

permalink
report
parent
reply
2 points

That actually makes sense. We had a ransomware attack once. We also disconnected the device but I cant remember if we powered it off. At the time it stopped encrypting due to that since our network drives were not reachable anymore.

Is there actually a way to spread the encryption process to a server?

permalink
report
parent
reply
1 point

Im not a it expert at alll. But reallly ?

permalink
report
parent
reply
1 point

Best I understand the encryption key is needed to encrypt and decrypt, so if the malware isn’t written well enough it may well continue to store the encryption key in memory.

There’s some old malware on archive.org that just pulls the FAT off the filesystem into memory and offers a dice roll to restore it

permalink
report
parent
reply

Programmer Humor

!programmerhumor@lemmy.ml

Create post

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

  • Posts must be relevant to programming, programmers, or computer science.
  • No NSFW content.
  • Jokes must be in good taste. No hate speech, bigotry, etc.

Community stats

  • 5.6K

    Monthly active users

  • 1.5K

    Posts

  • 35K

    Comments