[kwlug-disc] Synology, and proprietary disk formats ...
CrankyOldBugger
crankyoldbugger at gmail.com
Wed Aug 6 13:40:53 EDT 2014
I just sent a post to the KWCrypto group about how some whitehats cracked
CryptoLocker and set up a website where you can get a free unlock key.
Here's the link:
http://arstechnica.com/security/2014/08/whitehats-recover-victims-keys-to-cryptolocker-ransomware/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+arstechnica/index+%28Ars+Technica+-+All+content%29
Jeff, who thinks he just stole Bob's ammo...
On 6 August 2014 12:48, Paul Nijjar <paul_nijjar at yahoo.ca> wrote:
> On Tue, Aug 05, 2014 at 07:29:49PM -0400, Khalid Baheyeldin wrote:
> > The news was out about a Synology ransom ware exploit.
> >
> > http://soylentnews.org/article.pl?sid=14/08/05/1250223
> >
> > But what caught my eye is this comment about the disk formats being
> > proprietary and unreadable on a Linux system
> >
> > http://soylentnews.org/comments.pl?sid=3232&cid=77644
> >
> > Hostage but for another reason ...
> >
> > Posting this for those who use Synology in this group ...
>
> Here we go. As if Cryptolocker was not bad enough it has now jumped
> the operating system gap to embedded devices. Is all your firmware up
> to date? Are the manufacturers of your firmware even producing updates
> for your stuff? It sounds as if the Synology people are supporting
> this issue, but there are lots of organizations that don't.
>
>
> Systems administration is getting more and more unpleasant.
>
> I think Bob Jonkman just got some ammunition for the October KWLUG
> presentation.
>
>
> --
> http://pnijjar.freeshell.org
>
>
> _______________________________________________
> kwlug-disc mailing list
> kwlug-disc at kwlug.org
> http://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://kwlug.org/pipermail/kwlug-disc_kwlug.org/attachments/20140806/588cb5eb/attachment.htm>
More information about the kwlug-disc
mailing list