If you have the vulnerable file types files in the local machine sync
folders for those, then I presume if the local file gets encrypted then
the encrypted version will get synced up to the cloud. The ransomware
wouldn't be able to directly access a file in the cloud as I imagine it
uses the Windows API.

One way back from this would be if you had volume shadow services
working, which might let you step back through previous versions of a
file.

-- 
  Alan Bourke
  alanpbourke (at) fastmail (dot) fm

On Wed, 7 Oct 2015, at 04:52 PM, John Weller wrote:
> Is CryptoLocker liable to attack cloud based data such as Dropbox,
> oneDrive,
> etc?
> 
> John
> 
> John Weller
> 01380 723235
> 07976 393631
> 
> 
> > 
> > Kurt,
> > The Cryptolocker ransomware only infected mapped drives (F:, G:.... etc)
> and
> > if your shortcuts on the desktop and elsewhere were all based upon URL's
> > then Cryptolocker did NOT spread the infection. I don't know about the new
> > variants as they may well differ but I made a change on all my clients
> > removing mapped drives completely and the two instances since doing this
> > (on different clients) were restricted to local files.
> 
> 
> 
[excessive quoting removed by server]

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/1444235118.3172694.403959777.034ef...@webmail.messagingengine.com
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to