Jump to content

Molianne

Members
  • Posts

    4
  • Joined

  • Last visited

Reputation

0 Neutral
  1. I think I'm all set. I've taken note of your advice regarding anti virus applications you suggested and will look onto that in the very near future. Thank you so so much for your replies; you've successfully reassured me and helped me understand better how ransomwares work. I'm less worried about plugging back in my flash drives (still haven't done it yet though), because if I understood right, the trojan "root" ( ?) should not have copied itself on them, so it won't be spreading and begin the encryption process all over again, which was my main concern. If some files are already encrypted on one of them, so be it, I'll just delete them and go on with my day without worry. So once again, thank you, thank you, thank you! ~Molianne
  2. OK, got it, thanks! In regards to my external hard drive, it is indeed turned off when I'm not using it. It is a mapped drive (I assigned it the K letter for instance), so I've taken the habit to shut it down just so I wouldn't mess anything up (or in case of a malware). Anyway. I used to have a Kaspersky antivirus running (real-time protection) a few years ago, but I found it to slow down the comptuer too much so I didn't buy it again the following year. I've been using Malwarebytes Anti-Malware to run scans periodically for quite some time now and only recently downloaded Malwarebytes Anti-Exploit as an extra layer. Other than that, I try to "just be careful" even though I do know it is absolutely not the best strategy. ~Molianne
  3. HI David, Thank you so much for your answer, I get it better now! And sorry about the virus vs trojan terminology, it was my French slang taking over me...! The employer/work side is all covered now. This is the second attack that happened to the owner so the IT team (professionals) did what needed to be done (at least to my knowledge). I'm usually good at working out what's legit and what is not in terms of malware (incoming emails, websites, weird looking links and the likes) and my personnal computer has been kept free of malware for years now; this is why it angered me SO much to catch the worst of them all, and especially at work. The IT guy told be that if I'd have been in a more quiet place, I probably would have heard the computer "working" while my files were being encrypted... But I'm wondering, how long does it takes? They can't all be encrypted within seconds... So say for my almost full 1To external hard drive; if my files are being encrypted over a week period, and if I copy one somewhere else, would I be able to read the file if I haven't had the message for the ransom yet? I'm sorry, I think I'm rambling here... My last question would be: would you recommend MCShield as a flash drive anti-malware? Or can Malwarebyte Anti-Malware be set to do that? Thanks again!! ~Molianne
  4. Hi, I'm not sure if this is the right thread to post this in, and if it's not, I'm sorry; maybe it would have belonged better in "General PC Help"... But I'm really looking for an answer I can't seem to find. Here goes my situation: I've suffered a ransomware attack on my work computer a few weeks ago. The ransom has been paid and we got my files back (and a backup plan has been set up so we don't find ourselves stuck in that same situation should it happen again). The decrypted files were put back on the computer after it's been wiped clean and all is well on that side. What bothers me though is that I have no idea when or how that virus entered my computer and how long it took to encrypt my files (hours? days? months??). I know that ransomwares can travel through the computer to infect any external drives that could have been connected to it, and I have connected a few USB flash drives in the weeks before getting the stupid "what happened to your files" message. So I'm wondering: how do I know whether or not those USB flash drives are infected? How can I even safely verify that?? Because if they are indeed infected, the virus is just going to travel to the computer and start its dirty work again, right? Or if a few (or all) files on the drives are crypted, would they be able to start the viral process again or do they need the "main" virus file to do so (which was on my work computer; your anti-malware found it)? Then again, could the main virus file have copied itself on my drives? Ugh, so many questions (I'm sorry!)... I haven't connected the drives to any computer since the attack because of the fear it could all just happen again (should it be on my personal or work computer). Would you have an answer or a solution for me? Or am I just over paranoid about it? Thanks a lot in advance! ~Molianne
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.