Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
SecureMyBit Review
Message
<blockquote data-quote="DardiM" data-source="post: 540770" data-attributes="member: 52613"><p>I'm not sure what functions exactly use every ransomware, if its purely the real extension that is retrieve, the files created this way can be ignored by ransomware.</p><p></p><p>By function that searches for the beginning of extension like <span style="color: #0000b3">*.txt</span> (like when you search for all files with this extension using windows search), the part after seems to be ignored / not important, so a list of files can be returned if the beginning is recognized.</p><p>For encryption, file is just used as binary data, a method to memorize the real extension is used, and the name of the files found (returned on a list by *.extension) is given as parameter, but in this case if a check is done, may be a ransomware should ignore them, not sure.</p><p></p><p>It would be interesting to test with VM and .jpg files modified this way</p></blockquote><p></p>
[QUOTE="DardiM, post: 540770, member: 52613"] I'm not sure what functions exactly use every ransomware, if its purely the real extension that is retrieve, the files created this way can be ignored by ransomware. By function that searches for the beginning of extension like [COLOR=#0000b3]*.txt[/COLOR] (like when you search for all files with this extension using windows search), the part after seems to be ignored / not important, so a list of files can be returned if the beginning is recognized. For encryption, file is just used as binary data, a method to memorize the real extension is used, and the name of the files found (returned on a list by *.extension) is given as parameter, but in this case if a check is done, may be a ransomware should ignore them, not sure. It would be interesting to test with VM and .jpg files modified this way [/QUOTE]
Insert quotes…
Verification
Post reply
Top