How to properly wip...
 

MegaSack DRAW - This year's winner is user - rgwb
We will be in touch

[Closed] How to properly wipe hard drive after virus

11 Posts
8 Users
0 Reactions
63 Views
Posts: 305
Free Member
Topic starter
 

Hi - been properly infected by one of these viruses which encrypts all your files and gives you a ransom demand... Would like to completely refresh my laptop - starting with a blank hard drive. Any tips for making sure its properly wiped, including anything lurking in the MBR? Planning to put Hiren's boot CD on a USB drive and use one of the drive wiping tools.. Will that do it?


 
Posted : 24/05/2016 9:29 am
Posts: 0
Free Member
 

low level format?


 
Posted : 24/05/2016 9:35 am
Posts: 251
Full Member
 

Take the opportunity to upgrade to an SSD if you haven't already? Then scrap the drive.

Prices have come down hugely and speed improvement over traditional disk is huge.

You clearly have backups available so just continue to do those and you're fine.


 
Posted : 24/05/2016 9:38 am
Posts: 8934
Full Member
 

wwaswas makes a good case, but if you really want to keep the drive, look up DBAN and see whether that would do the job. An SSD has the added advantage of being much faster than spinning rust.

You could also potentially add it as a second drive on a linux machine and kill the whole thing with shred, but I don't know whether that would get rid of the boot sector and everything in it. Booting off a linux live CD would do the same thing.

DBAN would be my first choice, closely followed by a power drill and a tube of mastic or expanding foam.


 
Posted : 24/05/2016 9:41 am
Posts: 0
Full Member
 

+1 for DBAN


 
Posted : 24/05/2016 9:45 am
Posts: 13594
Free Member
 

[img] [/img]


 
Posted : 24/05/2016 9:54 am
 xora
Posts: 950
Full Member
 

From a linux live cd

dd if=/dev/zero of=/dev/sdX count=1k bs=1k

where /dev/sdX is the device of the drive.

Then just install windows on it. Anything more than this is just making uneeded work for yourself.


 
Posted : 24/05/2016 10:47 am
Posts: 251
Full Member
 

Oh, and work out what you did to get the virus in the first place and don't do it again!


 
Posted : 24/05/2016 10:49 am
Posts: 305
Free Member
Topic starter
 

Thanks for the tips. I think a weak password on my vnc did for me..

Thought I had a good backup regime but not sure how much I can get back. Everything was synced with Google drive but as the files got encrypted they were duly updated on drive then nicely downloaded to my other machines so that the encrypted versions are everywhere. Looks like Google allows access to previous versions but only one by one so 10000 photos is going to takes some serious time..


 
Posted : 24/05/2016 11:03 am
Posts: 621
Free Member
 

Which ransomware was it? Some had the private keys released the other day, and somebody has subsequently written a decrypter for it.


 
Posted : 24/05/2016 11:08 am
Posts: 8934
Full Member
 

And also, VNC? Exposed to the internet?

Hang your head in shame...


 
Posted : 24/05/2016 11:31 am
Posts: 305
Free Member
Topic starter
 

Which ransomware was it?

Twas some nastiness which calls itself "cerber".. will google when I have a machine I can trust enough to switch the router back on.. Would be nice to get the pics of my kids back!

And also, VNC? Exposed to the internet? Hang your head in shame...

I know - brought it on myself - who knew "password" isn't a strong password?? And I tried to blame it on kids downloading minecraft hacks.


 
Posted : 24/05/2016 11:38 am