Search the Community
Showing results for tags 'ransonware'.
Last week our network was hacked into by an unknown party. Our firewall was open for remote connections to allow a firm that is performing major upgrades to our Microsoft Dynamics ERP software. Prior to this project, I set up a VPN connection on our Sonicwall firewall device and both myself and the local office of the firm doing the upgrades were able to log in successfully. However, the firm doing the upgrades has a team doing much of the work from India. The folks in India insisted they were unable to connect via the VPN and had to use a much less secure route. Yes, this should have bee
We have a user machine that is affected by the GandCrab ransomware. This machine has both Anti-Malware and Anti-Exploit installed. Virustotal results for the hash: https://www.virustotal.com/en/file/760cdf98264ebefdc2bcfb0c90e88ea9cd26130041260f12bb89b79a94134ec7/analysis/
I seem to have gotten Behavior:Win32:Teerac.gen!A I downloaded the beta here, as I have (if memory serves here I have been doing this for 40 years now) not previously installed Malware-bites. Now I have it quarantined and I delete it every boot yet it persists. I do know it is written at least in part in Autoit and If I knew the version it was written in I would have a better chance of defeating this. What distress me is the beta here did not catch such a SEVERE Virus. Now I must admit I did not edit boot so it loaded first, that is reserved for my fshoster realtime securit