فروش سرور مجازی و اختصاصی

وب هاست پرشین قابل اعتماد و پاسخگو

.In
12.000ت
.Com
35.000ت
.Net
39.000ت
.Org
44.000ت
سلام
متاسفانه امروز صبح یک باگ امنیتی بسیار خطرناک در ویندوز منتشر شد.
که از صبح امروز تا به الان بیشتر از هزاران سرور قربانی این اکسپلویت شدند و کلی از دیتا ها از بین رفتند و همچنان ادامه دارد
بیشتر حمله روی سرورهای ویندوز 2008 و 2012 میباشد که تا کنون هیچ کدام از کمپانی های مطرح جهان راه حلی برای این موضوع نداده اند
ماکروسافت یک پچ ارایه داده است و شدیدا توصیه میشود اخرین اپدیتها را روی سرور خود نصب نمایید که در صورت الوده شدن به این ویروس راه بازگشتی وجود ندارد

اطلاعیه در انجمن تخصصی وب هاستینگ ایران

http://www.webhostingtalk.ir/showthread.php?t=184801

متن هک که داخل سرورها می گذارند جهت اخاذی
روی لینکهای زیر کلیک نکنید

Hello everyone,

seems like zadaz had similar issue, and found a way to fix it with the help of AES_IN.
I got the same things, anyone can help me please?

I'm tempting to simply format my computer, but I have some family picture I'd like to get back...

Thanks for your help, im terribly bad since this morning, and cant even finish decently a month, so obviously cannot pay any ransom.

Even if no one can help, thanks for taking time readin ig anyway.

Edit : I cannot even start windows, a new user is up... I had to check it with another computer

===============================# aes-ni ransomware #===============================

█████╗ ███████╗███████╗ ███╗ ██╗██╗
██╔══██╗██╔════╝� �█╔════╝ ████╗ ██║██║
███████║█████╗ ███████╗█████╗██� �██╗ ██║██║
██╔══██║██╔══╝ ╚════██║╚════╝██� �╚██╗██║██║
██║ ██║███████╗█████� �█║ ██║ ╚████║██║
╚═╝ ╚═╝╚══════╝╚════� �═╝ ╚═╝ ╚═══╝╚═╝

SPECIAL VERSION: NSA EXPLOIT EDITION

INTRO: If you are reading it, your server was attacked with NSA exploits.
Make World Safe Again.

SORRY! Your files are encrypted.
File contents are encrypted with random key (AES-256 bit; ECB mode).
Random key is encrypted with RSA public key (2048 bit).

We STRONGLY RECOMMEND you NOT to use any "decryption tools".
These tools can damage your data, making recover IMPOSSIBLE.

Also we recommend you not to contact data recovery companies.
They will just contact us, buy the key and sell it to you at a higher price.

If you want to decrypt your files, you have to get RSA private key.
In order to get private key, write here:

0xc030@protonmail.ch
0xc030@tuta.io
aes-ni@scryptmail.com

IMPORTANT: In some cases malware researchers can block our e-mails.
If you did not receive any answer on e-mail in 48 hours,
please do not panic and write to BitMsg (https://bitmsg.me) address:
BM-2cVgoJS8HPMkjzgDMVNAGg5TG3bb1TcfhN
or create topic on https://www.bleepingcomputer.com/ and we will find you there.

If someone else offers you files restoring, ask him for test decryption.
Only we can successfully decrypt your files; knowing this can protect you from fraud.

You will receive instructions of what to do next.
You MUST refer this ID in your message:

ADMIN-PC#89D85152E96ABC33778F0E8042BA9E57

Also you MUST send all ".key.aes_ni_0day" files from C:\ProgramData if there are any.


===============================# aes-ni ransomware #===============================


Tuesday, April 18, 2017

« برگشت