openssl req -x509 -nodes -days 4096 -newkey rsa:4096 -keyout /etc/apache2/ssl/zoneminder.key -out /etc/apache2/ssl/zoneminder.crt
net localgroup USER GROUP /add
net localgroup GROUP USER /add
Here’s an actual Outlook inbox (On-premise exchange, note that Office 365 mailboxes are silently discarding this attachment)
From the offset Gmail and Office365 were not spreading the malware forward. 365 silently drops the mail, Gmail sends you a friendly heads-up…
Namecheap private email is blissfully unaware 20 hours after the first report of a suspicious attachment.
ESET has added signatures for this outbreak at last, many hours behind other antivirus vendors but still not as late as; ALYac AVware Agnitum AhnLab-V3 Alibaba Antiy-AVL Baidu Baidu-International Bkav ByteHero CAT-QuickHeal CMC ClamAV Comodo DrWeb F-Secure Ikarus Jiangmin K7AntiVirus K7GW Malwarebytes Microsoft NANO-Antivirus Panda Qihoo-360 Rising SUPERAntiSpyware Symantec TheHacker TrendMicro TrendMicro-HouseCall VBA32 ViRobot Zillya Zoner nProtect
At the end of today (actually well into the following day now) all the above vendors haven’t added signatures for this seriously damaging ransom-ware infection.
Researchers and analysts: download payload
If you don’t know the password, email firstname.lastname@example.org and ask nicely.
Elevated command prompt
manage-bde -lock X:
where X: is your drive letter e.g D:\