NCSG-DISCUSS Archives

NCSG-Discuss

NCSG-DISCUSS@LISTSERV.SYR.EDU

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Casey Olugbenga Adeleye <[log in to unmask]>
Reply To:
Casey Olugbenga Adeleye <[log in to unmask]>
Date:
Thu, 24 Mar 2016 14:45:51 +0200
Content-Type:
text/plain
Parts/Attachments:
text/plain (59 lines)
Thanks Wisdom for sharing.

Casey Adeleye

Quoting Wisdom Donkor <[log in to unmask]>:

> Dear All,
>
> Yesterday at 2:38pm an employee in one of the organisation in Ghana was
> attacked by ransomware by name locky, this ransomware was sent in an email
> with an attachment , the attachment contained an ms-word document with a
> malicious macro, the locky program was activated when the user clicked
> "enable editing " after the document was opened, this macro begun an
> encryption process using a RSA-2048 and AES-128 algorithm, the encryption
> process targeted the following file extensions
>  *.docx;*.pdf;*.pptx;*.xlsx;*.doc
>
> Yesterday Three US hospitals were hit by "locky" as well,The IT systems of
> Kentucky Methodist Hospital and Chino Valley Medical Center and Desert
> Valley Hospital, California, were infected with this ransomware,
> The files cannot be recovered unless the victim has an offline backup to
> recover from or pays a ransom with bitcoins via the darkweb,the attackers
> promise to send the private key in a compiled program to decrypt the
> victim's files after they receive payment.
> System restore cannot restore files just settings so it will not help in
> this case.
>
> Third-party recovery software cannot recover the encrypted files because
> the files are not considered as deleted. The previous ransomware by name
> "cryptolocker" did not rename the files it encrypted so it was possible to
> recover your files by using the windows "previous version" feature, however
> "locky" renames all the files it encrypts so that windows cannot index the
> file's shadow copies to recover them.
>
> CERT-GHANA recommends that all users open email attachments with caution
> especially executable files.
>
> Cheers,
>
>
>
>
>
> *WISDOM DONKOR (S/N Eng.)*
> ICANN Fellow / ISOC Member, IGF Member, Diplo Foundation
> OGP Working Group Member, Africa OD Working Group Member
> E-government and Open Government Data Platforms Specialist
> National Information Technology Agency (NITA)
> Ghana Open Data Initiative (GODI)
> Post Office Box CT. 2439, Cantonments, Accra, Ghana
> Tel; +233 20 812881
> Email: [log in to unmask]
> [log in to unmask]
> [log in to unmask]
> Skype: wisdom_dk
> facebook: facebook@wisdom_dk
> Website: www.nita.gov.gh / www.data.gov.gh
> www.isoc.gh / www.itag.org.gh

ATOM RSS1 RSS2