[148210] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Cryptolocker

daemon@ATHENA.MIT.EDU (Bryan Bishop)
Thu Nov 21 22:47:33 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <528ECF23.2090601@kjro.se>
Date: Thu, 21 Nov 2013 21:45:29 -0600
From: Bryan Bishop <kanzure@gmail.com>
To: Kelly John Rose <iam@kjro.se>, Bryan Bishop <kanzure@gmail.com>
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Thu, Nov 21, 2013 at 9:27 PM, Kelly John Rose <iam@kjro.se> wrote:
> Almost sounds like it would be worth having some sort of software keep
> their eyes open for CryptoLocker and grab the AES key, if possible,
> proactively.

What is the advantage of that over, say, detecting CryptoLocker and
killing its process or scanning files before they hit a user's
machine? Also, given a generic CryptoLocker detector, other viruses
will definitely sit around waiting to see CryptoLocker, steal the
keys, and then charge less than whatever CryptoLocker is demanding.

- Bryan
http://heybryan.org/
1 512 203 0507
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post