Solved

Ransomware and Take Owndership permission

Posted on 2016-09-20
4
49 Views
Last Modified: 2016-09-20
Can anyone confirm that a user must have "take ownership" permission on a network share in order for ransomware to encrypt the files?
0
Comment
Question by:Chad_J_Lemmer
4 Comments
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 125 total points
ID: 41807986
No, that does not need to happen.

If a user already has access to the share, then that share can still be encrypted by ransomware if the user was affected and encrypted
0
 
LVL 56

Accepted Solution

by:
Cliff Galiher earned 250 total points
ID: 41807988
Absolutely not. Plenty of cryptoware works without take ownership.
0
 
LVL 30

Assisted Solution

by:pgm554
pgm554 earned 125 total points
ID: 41807992
If you have R/W permissions to a file,you can encrypt it.
AFAIK you do not need ownership to encrypt a file.
0
 

Author Comment

by:Chad_J_Lemmer
ID: 41808000
Thank you all for confirming.  I must have received some bad information.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
In this Micro Tutorial viewers will learn how to use Windows Server Backup to create full image of their system. Tutorial shows how to install Windows Server Backup Feature on Windows 2012R2 and how to configure scheduled Bare Metal Recovery backup.…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now