Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I read the two articles, Thinking about this problem


  • Please log in to reply
8 replies to this topic

#1 hypotenuseleg

hypotenuseleg

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:04 AM

Posted 11 January 2017 - 08:27 AM

From

 

https://www.bleepingcomputer.com/news/security/the-locky-ransomware-encrypts-local-files-and-unmapped-network-shares/

 

https://www.bleepingcomputer.com/news/security/jigsaw-ransomware-decrypted-will-delete-your-files-until-you-pay-the-ransom/

 

My questions

 

1) For the whole disk encryption?

2) If the hard disk is very big, time need a long time?

3) I have seen is a c # code, the user must have..net 4.0?

 

Some experts will answer my question?

I am from China I am happy to discuss with you


Edited by hypotenuseleg, 11 January 2017 - 08:32 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:04 PM

Posted 11 January 2017 - 08:38 AM

The above links are two different ransomwares.

I do not fully understand your questions?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 hypotenuseleg

hypotenuseleg
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:04 AM

Posted 11 January 2017 - 10:11 AM

The above links are two different ransomwares.

I do not fully understand your questions?

 

What I mean is whether to the entire hard disk file encryption.



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:04 PM

Posted 11 January 2017 - 01:10 PM

Locky encrypts local files on the hard drive and unmapped network shares. It will encrypt files which match those listed in the link above. Jigsaw will scan your drives for certain file extension, then encrypt them as noted in the link above.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,085 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:04 PM

Posted 11 January 2017 - 05:19 PM

From
 
https://www.bleepingcomputer.com/news/security/the-locky-ransomware-encrypts-local-files-and-unmapped-network-shares/
 
https://www.bleepingcomputer.com/news/security/jigsaw-ransomware-decrypted-will-delete-your-files-until-you-pay-the-ransom/
 
My questions
 
1) For the whole disk encryption?
2) If the hard disk is very big, time need a long time?
3) I have seen is a c # code, the user must have..net 4.0?

1) Most ransomware has a set list of extensions of files that they target, meaning they will encrypt most files, some will target less files. Most don't have full disk encryption capabilities (making you unable to even boot the computer properly), though there has been a couple which can.
2) Not necessarily. Depends on the encryption algorithm, and how the malware author implements it.
3) Again, not necessarily. They can make c# code which depends on lower versions of .NET. Not running any version of .NET is not very practical as many legitimate applications also use it.
 
xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#6 hypotenuseleg

hypotenuseleg
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:04 AM

Posted 12 January 2017 - 01:46 AM

 

From
 
https://www.bleepingcomputer.com/news/security/the-locky-ransomware-encrypts-local-files-and-unmapped-network-shares/
 
https://www.bleepingcomputer.com/news/security/jigsaw-ransomware-decrypted-will-delete-your-files-until-you-pay-the-ransom/
 
My questions
 
1) For the whole disk encryption?
2) If the hard disk is very big, time need a long time?
3) I have seen is a c # code, the user must have..net 4.0?

1) Most ransomware has a set list of extensions of files that they target, meaning they will encrypt most files, some will target less files. Most don't have full disk encryption capabilities (making you unable to even boot the computer properly), though there has been a couple which can.
2) Not necessarily. Depends on the encryption algorithm, and how the malware author implements it.
3) Again, not necessarily. They can make c# code which depends on lower versions of .NET. Not running any version of .NET is not very practical as many legitimate applications also use it.
 
xXToffeeXx~

 

 

WIN7=.NET 3.5

WIN8=.NET 4.0

I have read the hidden-tear code.

You must use 4.0

After all, he is open source

----

I have a question.

If my computer has a 5 G mp3.

The encryption process is very long.

If is fully encrypted, also need to go to the search first.

The CPU will end up a lot.



#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:04 PM

Posted 12 January 2017 - 06:59 AM

Maybe it's me but I'm still having a hard time understanding your questions clearly.

The time factor for decryption of encrypted files will vary depending on a variety of factors....how may files need to be decrypted, file size, the quality of the decryptor tool, the computer's specifications (single-core, dual-core, quad-core processor)...increase in decryption speed is directly proportional to the number of cores and/or processors as explained here. Thus, decryption can take several hours or even days and may not be 100% successful.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 hypotenuseleg

hypotenuseleg
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:04 AM

Posted 12 January 2017 - 07:54 AM

Maybe it's me but I'm still having a hard time understanding your questions clearly.

The time factor for decryption of encrypted files will vary depending on a variety of factors....how may files need to be decrypted, file size, the quality of the decryptor tool, the computer's specifications (single-core, dual-core, quad-core processor)...increase in decryption speed is directly proportional to the number of cores and/or processors as explained here. Thus, decryption can take several hours or even days and may not be 100% successful.

 

thank you



#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:04 PM

Posted 12 January 2017 - 10:24 AM

You're welcome.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users