We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
74,953 News Articles

Data encryption adds twist to ransomware

A new version of the well-known police ransomware takes the unusual step of encrypting files on the infected PC, so the malware cannot be easily removed.

The ransomware warns victims that they have committed a crime, such as downloading pirated software, and their computers will remain locked until a fine is paid. The warning is dressed up to look like it's from the FBI or other law enforcement agency.

Typically, ransomware can be found and removed without paying the fraudsters. However, the latest version of the police ransomware Trojan encrypts images, documents and executables to stifle attempts to remove the malware, says a report in the AVG News and Threats blog.

"While not completely original, it is certainly unusual," Adam Wosotowsky, a security researcher for McAfee Labs, said of the anti-removal tactic. "Personally, I've cleaned some ransomware off a few machines and haven't heard of lost files due to encryption. To avoid file loss, we recommend copying personal files off the box ASAP and then re-installing Windows."

The malware does not encrypt Windows system files, so the infected PC will still work. However, the app's shenanigans do lead to a loss of some data and prevents many third-party programs from working.

[See also: Threat report fingers Android again, this time for ransomware]

Known as Reveton, the ransomware was initially found spreading in various European countries in early 2012. In May, Trend Micro found templates that indicated the authors were planning to target people in the U.S. and Canada.

In August, the FBI issued a warning saying the ransomware was spreading quickly. "We're getting inundated with complaints," Donna Gregory of the Internet Crime Complaint Center said at the time.

Symantec estimates that nearly 3% of victims end up paying ransoms, which translates into more than $5 million a year paid to cybercriminals.

The malware is typically installed when victims click a link on a compromised website. Once infected, a PC immediately locks and the warning demanding payment appears.

Malicious scripts and iFrames, Web technologies used to infect PCs on compromised sites, had an 83% success rate last year, according to Cisco's 2013 Security Report, released Wednesday.

"These types of attacks often represent malicious code on 'trusted' Web pages that users may visit every day-- meaning an attack is able to compromise users without even raising their suspicion," the report says.

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.


IDG UK Sites

Samsung Galaxy Note 4 release date, price and specs 2014

IDG UK Sites

iOS 8 features wishlist: the changes iPhone and iPad users want in Apple's iOS 8

IDG UK Sites

25 Years of the World Wide Web: Happy Birthday, Intenet

IDG UK Sites

Developers get access to more Sony camera features