In early September 2013, Quick Heal Threat Research and Response lab has received several incidents about a malware that once executed encrypts files in the victim’s computer, and demands a certain ransom for decryption. This malware makes demand of US$300 through prepaid card services like UKash, Bitcoin or MoneyPak.
This type of malware is popularly known as ransomware and is spread using social engineering tricks especially via email such as fake FedEx or UPS tracking notifications with attachments. Once the victim opens such email attachments, CryptoLocker gets installed and starts scanning the hard disk for all kinds of documents.
These include images, videos, documents, presentations and spreadsheets. Thereafter, it encrypts these files, converting them into an unreadable form. The ransomware then pops up a message, like the once shown below, in which it demands the victim to, pay up $300 (currently) to buy a private key to decrypt the files. The message also displays a time limit within which the payment must be made.
Sanjay Katkar, CTO, Quick Heal, stated, This is one of the most destructive malwares I have seen till date, says Sanjay Katkar, CTO of India’s leading antivirus software Quick Heal. For the last couple of weeks, we have been seeing 500+ incidents per day of this malware. The incidents are being reported from all over India. It is essential that everyone connected to the Internet is aware of such a damaging malware. In these cases, prevention is always better than cure.
Hackers behind this malware are able to avoid the trace back by using digital cash systems like Bitcoins and MoneyPack where the payments can be anonymous.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.