Jump to content
Posted 26 October 2013 - 03:30 PM
Posted 26 October 2013 - 03:36 PM
Posted 26 October 2013 - 03:44 PM
Posted 26 October 2013 - 04:30 PM
Maybe add the option of, if you could go back and pay the ransom, would you? We cannot go back do to cleanup methods and registry keys and the encryption key being lost forever but if we could we would pay it.
Posted 26 October 2013 - 08:25 PM
We had 15 clients get this (some of them twice. In NONE of the instances did we pay the ransom, even when it meant the client losing some data. Not sure if I can vote 15 times.
Posted 27 October 2013 - 11:53 AM
Probly fixed about 30 of these types of infections. I had a few of my clients come in and stated they payed useing a card they bought at Walgreens. I think it even says you can goto several places to pay for it. The funny thing is, and people dont get it. I had to ask each one of them. If the government did this to you, do you think we would be setting here having this conversation? In all my cases no data was lost that could not be recovered or replaced from a backup. It seams the rest of the world knows how scared we are of are own government.
I wander how many people got realy scared and went the set computer on fire in the back yard and bury it in the neighbors yard route.
Edited by Derpapotomus, 27 October 2013 - 12:16 PM.
Posted 27 October 2013 - 08:26 PM
Posted 29 October 2013 - 04:15 PM
ill be posting my refund check here:
I think i might have slipped through the cracks, waiting for an envelope!!!!
Posted 29 October 2013 - 07:46 PM
Really enjoy seeing all the techies talk about how they fixed the problem. Yes we have backup of the important stuff. No we do not on alot of stuff. My questions did their bill exceed the money that was requested and how much data was lost? Being out of business for a period of time just to say I did not pay seems a little "DUH"
Posted 06 November 2013 - 09:00 PM
well some COMPANIES have no other alternative but to pay.
A company that didnt have backups and losing 20+ years worth of data, $300 sounds feasible.
I somehow slipped through the cracks and got a refund from GreenDot.
CryptoLocker uses MoneyPak that has a code to "redeem" whatever money is on the card.
GreenDot provides a medium to load the MoneyPak code onto a debit card.
I entered the code and once it started to decrypt, i loaded the MoneyPak code on the GreenDot debit and cancelled my account.
I DID get a refund from GreenDot.
*Site admins, if you think this is bogus, im sure you can reverse DNS my IP address and google my company name on that rDNS and give me a call.
*Im an IT consultant and chose to use this SN to stay anonymous from non believers.
*I truly hope someone tries this, because if there is no other alternative, what can this hurt?
Posted 13 November 2013 - 04:00 AM
We all must remember how serious this is and we must not look down on those who pay the ransom!! (We arent all on the same knowledge level)
BleepingComputer.com is taking an anonymous poll on who has paid the ransom, and if you did, what payment method did you use.
Edited by 4dude, 13 November 2013 - 04:01 AM.
0 members, 0 guests, 0 anonymous users