Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
TEMASOFT Ranstop handles over-the-network ransomware attack
Message
<blockquote data-quote="cruelsister" data-source="post: 611663" data-attributes="member: 7463"><p>HI Guys- Sorry for the delay in response but I had to finish up my work in order to fly back home today. I hope to complete a video (I will) this weekend for publication early next week.</p><p></p><p>Calin- I did not mean to imply in any way that the backup files were trashed. Far from it! I found the system you employ to Backup and Restore compromised files to be excellent. Although one can never rule out a breach of this system, it would take a targeted attack and much work (even if it were possible). I feel the chance of anyone ever seeing such a breach to be non-existent in Real Life.</p><p></p><p>Luke- 1). as this preliminary test was my first experience with Ranstop, I did what I always do- acquire ransomware samples that are in wide distribution on a given day that have not showed up before. So no crappy script-kiddies stuff nor malware that is targeted for a small population are used. Mostly these are the malware files that are carried via exploits on infected pages or more commonly Bot distributed email attachments to the Masses.</p><p></p><p>2). Although I will never (ever) run malware samples simultaneously, sometimes I will run them sequentially. By this I mean that I will never run the second sample on the same machine until and unless the preceding sample has been stopped and is no longer active in any way. Also, obviously if a ransomware sample ever makes it through a new system will be used thereafter; but also occasionally the encryption process will be stopped, but the malware vector itself will still be active pounding away in vain- this case would also necessitate a new system.</p><p></p><p>(Minor Rant begins) But on this topic- I found it hilarious that a certain developer brought up the exact same point about their product which I trashed numerous times in the past. I actually lowered myself to do an Addendum video because of this. I've found that such jive-time arguments are often the last refuge for the coders of a sub-optimal application (Minor Rant Ends).</p><p></p><p>Harbor- You point about a Ranstop and Appcheck comparison is an excellent one. I've been thinking about the same thing (Great Minds think Alike!!!) and am unsure how to implement it in a fair manner...</p><p></p><p>(Time to Fly)</p></blockquote><p></p>
[QUOTE="cruelsister, post: 611663, member: 7463"] HI Guys- Sorry for the delay in response but I had to finish up my work in order to fly back home today. I hope to complete a video (I will) this weekend for publication early next week. Calin- I did not mean to imply in any way that the backup files were trashed. Far from it! I found the system you employ to Backup and Restore compromised files to be excellent. Although one can never rule out a breach of this system, it would take a targeted attack and much work (even if it were possible). I feel the chance of anyone ever seeing such a breach to be non-existent in Real Life. Luke- 1). as this preliminary test was my first experience with Ranstop, I did what I always do- acquire ransomware samples that are in wide distribution on a given day that have not showed up before. So no crappy script-kiddies stuff nor malware that is targeted for a small population are used. Mostly these are the malware files that are carried via exploits on infected pages or more commonly Bot distributed email attachments to the Masses. 2). Although I will never (ever) run malware samples simultaneously, sometimes I will run them sequentially. By this I mean that I will never run the second sample on the same machine until and unless the preceding sample has been stopped and is no longer active in any way. Also, obviously if a ransomware sample ever makes it through a new system will be used thereafter; but also occasionally the encryption process will be stopped, but the malware vector itself will still be active pounding away in vain- this case would also necessitate a new system. (Minor Rant begins) But on this topic- I found it hilarious that a certain developer brought up the exact same point about their product which I trashed numerous times in the past. I actually lowered myself to do an Addendum video because of this. I've found that such jive-time arguments are often the last refuge for the coders of a sub-optimal application (Minor Rant Ends). Harbor- You point about a Ranstop and Appcheck comparison is an excellent one. I've been thinking about the same thing (Great Minds think Alike!!!) and am unsure how to implement it in a fair manner... (Time to Fly) [/QUOTE]
Insert quotes…
Verification
Post reply
Top