Featured Articles

IHS teardown reveals Galaxy S5 BOM

IHS teardown reveals Galaxy S5 BOM

Research firm IHS got hold of Samsung’s new flagship smartphone and took it apart to the last bolt to figure out…

More...
Galaxy S5, HTC One M8 available selling well

Galaxy S5, HTC One M8 available selling well

Samsung’s Galaxy S5 has finally gone on sale and it can be yours for €699, which is quite a lot of…

More...
Intel lists Haswell refresh parts

Intel lists Haswell refresh parts

Intel has added a load of Haswell refresh parts to its official price list and there really aren’t any surprises to…

More...
Respawn confirms Titanfall DLC for May

Respawn confirms Titanfall DLC for May

During his appearance at PAX East panel and confirmed on Twitter, Titanfall developer Respawn confirmed that the first DLC pack for…

More...
KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 gained a lot of overclocking experience with the GTX 780 Hall of Fame (HOF), which we had a chance to…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Tuesday, 24 December 2013 14:44

Cryptolocker infects 250,000 computers

Written by Nick Farrell



Crims have extorted a million from victims

Dell Secureworks estimated that 250,000 systems have been infected globally in the first 100 days of the CryptoLocker threat and more than a million dollars has been given to buy the cyber criminals off. CryptoLocker is ransomware which encrypts user's important files and then demands money in return for decrypting them.

Dell Secureworks said that the criminals have managed to amass 1,216 bitcoins since September. Had the hackers immediately exchange bitcoins into dollars, the cash pile would have amounted to $380,000. If however, they held onto the money and exchanged them as of last week, that figure rises to $980,000, based on the current weighted price of $804/BTC. Even if Cryptolocker is removed, there is no way the encrypted files can be decrypted. Decryption keys are stored on one of many Cryptolocker servers. The files can only be restored by paying the ransom.

The authors of Cryptolocker have created a robust program that is difficult to circumvent," SecureWorks said in a blog post. "Instead of using a custom, cryptographic implementation like many other malware families, Cryptolocker uses strong third-party certified cryptography offered by Microsoft's CryptoAPI."

The malware has targeted English-speakers, specifically those located in the United States. "Malware authors from Russia and Eastern Europe, where the CryptoLocker authors are thought to originate, commonly target victims in North America and Western Europe," the researchers said.

Early versions of the malware were distributed through spam targeting businesses and threatened them with a customer complaint to get them to open the file.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

To be able to post comments please log-in with Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments