We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Data encryption adds twist to ransomware

A new version of the well-known police ransomware takes the unusual step of encrypting files on the infected PC, so the malware cannot be easily removed.

The ransomware warns victims that they have committed a crime, such as downloading pirated software, and their computers will remain locked until a fine is paid. The warning is dressed up to look like it's from the FBI or other law enforcement agency.

Typically, ransomware can be found and removed without paying the fraudsters. However, the latest version of the police ransomware Trojan encrypts images, documents and executables to stifle attempts to remove the malware, says a report in the AVG News and Threats blog.

"While not completely original, it is certainly unusual," Adam Wosotowsky, a security researcher for McAfee Labs, said of the anti-removal tactic. "Personally, I've cleaned some ransomware off a few machines and haven't heard of lost files due to encryption. To avoid file loss, we recommend copying personal files off the box ASAP and then re-installing Windows."

The malware does not encrypt Windows system files, so the infected PC will still work. However, the app's shenanigans do lead to a loss of some data and prevents many third-party programs from working.

[See also: Threat report fingers Android again, this time for ransomware]

Known as Reveton, the ransomware was initially found spreading in various European countries in early 2012. In May, Trend Micro found templates that indicated the authors were planning to target people in the U.S. and Canada.

In August, the FBI issued a warning saying the ransomware was spreading quickly. "We're getting inundated with complaints," Donna Gregory of the Internet Crime Complaint Center said at the time.

Symantec estimates that nearly 3% of victims end up paying ransoms, which translates into more than $5 million a year paid to cybercriminals.

The malware is typically installed when victims click a link on a compromised website. Once infected, a PC immediately locks and the warning demanding payment appears.

Malicious scripts and iFrames, Web technologies used to infect PCs on compromised sites, had an 83% success rate last year, according to Cisco's 2013 Security Report, released Wednesday.

"These types of attacks often represent malicious code on 'trusted' Web pages that users may visit every day-- meaning an attack is able to compromise users without even raising their suspicion," the report says.

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.


IDG UK Sites

Best Black Friday 2014 tech deals: Get bargains on smartphones, tablets, laptops and more

IDG UK Sites

What the Internet of Things will look like in 2015: homes will get smarter, people might get fitter

IDG UK Sites

See how Trunk's animated ad helped Ade Edmondson plug The Car Buying Service

IDG UK Sites

Yosemite tips: Complete Guide to OS X Yosemite