Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
More Fun with Ransomware Part 6
Message
<blockquote data-quote="DardiM" data-source="post: 517178" data-attributes="member: 52613"><p><span style="color: #0059b3">UACMe</span> <span style="color: #0059b3">v2.3</span> should bypass UAC from Windows 7 up to Windows 10 RS1 14367 build, am I wrong ?</p><p>=> Builds 14361, 14366, 14367 seem to have zero UAC related changes</p><p></p><p></p><p>I fully agree <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /> (but we might let UAC at max)</p><p></p><p>I Never read about a <u>ransomware</u> that does this.</p><p>They often only encrypt files that can have some sort of value or importance (with predefined extension), or all data on a drive (C: , D: , etc) , on cloud (if accessible) - without take care of file extension - to ask a ransom after the encyption.</p><p>But this is almost any time the same thing : loop on drives/files/folders and encrypt them (write on MBR for some ransomware).</p><p>On a "raw unloccated space", no name of drives/files/folders to put as parameter to their encrypting procedure.</p><p><u><span style="color: #b30000">That's only my point of view, I can be Wrong</span></u> <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p></blockquote><p></p>
[QUOTE="DardiM, post: 517178, member: 52613"] [COLOR=#0059b3]UACMe[/COLOR] [COLOR=#0059b3]v2.3[/COLOR] should bypass UAC from Windows 7 up to Windows 10 RS1 14367 build, am I wrong ? => Builds 14361, 14366, 14367 seem to have zero UAC related changes I fully agree :) (but we might let UAC at max) I Never read about a [U]ransomware[/U] that does this. They often only encrypt files that can have some sort of value or importance (with predefined extension), or all data on a drive (C: , D: , etc) , on cloud (if accessible) - without take care of file extension - to ask a ransom after the encyption. But this is almost any time the same thing : loop on drives/files/folders and encrypt them (write on MBR for some ransomware). On a "raw unloccated space", no name of drives/files/folders to put as parameter to their encrypting procedure. [U][COLOR=#b30000]That's only my point of view, I can be Wrong[/COLOR][/U] :) [/QUOTE]
Insert quotes…
Verification
Post reply
Top