[AusNOG] CryptoLocker Virus
Robert Hudson
hudrob at gmail.com
Thu Oct 24 09:56:58 EST 2013
This video highlights very nicely what I think is one of Microsoft's worst
security decisions ever (and one they persist with to this day) - to, by
default, hide the extension of known file types.
Meaning a file called malware.pdf.exe looks, to an uneducated user (or even
an educated one if the malware author bothers to include an icon within the
executable that gives it the appearance of a PDF file) look to be
malware.pdf. Or cutekitten.jpg.exe look like cutekitten.jpg.
And we all know that JPGs and PDFs are totally safe, right? :)
On 24 October 2013 09:31, Tim March <march.tim at gmail.com> wrote:
>
> There's a demo video at
>
> http://nakedsecurity.sophos.com/2013/10/18/cryptolocker-ransomware-see-how-it-works-learn-about-prevention-cleanup-and-recovery/
> for anyone interested in seeing how it works in practice...
>
>
>
> T.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20131024/01250d36/attachment.html>
More information about the AusNOG
mailing list