Feeds

Ransomware Trojan code break 'impractical'

Crackers says Schneier

Internet Security Threat Report 2014

Updated A cryptographic expert has questioned the practicality of a code breaking initiative geared to cracking the key used in the dangerous Gpcode-AK ransomware virus.

Gpcode-AK encrypts content on compromised PCs using a 1024-bit RSA key. In response, Russian net security firm Kaspersky Labs launched an international code-breaking initiative dubbed Stop Gpcode. It wants cryptography experts, other antivirus vendors and independent researchers to get involved in an effort to combat the mendacious malware.

Kaspersky reckons it would take approximately 15 million PCs, running for about a year, to crack the code.

But cryptographic expert Bruce Schneier argues that the effort is impractical, misguided and little better than a publicity stunt.

"We've never factored a 1024-bit number - at least, not outside any secret government agency - and it's likely to require a lot more than 15 million computer years of work. The current factoring record is a 1023-bit number, but it was a special number that's easier to factor than a product-of-two-primes number used in RSA," he writes.

"Breaking that Gpcode key will take a lot more mathematical prowess than you can reasonably expect to find by asking nicely on the internet," he adds.

Kaspersky said that such criticisms might be valid of a brute force attack but of uncovering weaknesses in the cryptographic techniques used by GPcode's anonymous authors.

"The initiative launched with Aleks Gostev's blog post isn't intended to crack 1024-bit encryption per se. Rather, our aim is to find a way of cracking Gpcode's implementation of it," David Emm, senior technology consultant at Kaspersky Lab explained.

"This is a much more realistic proposition; it may be that, as in previous variants, the implementation is flawed. That's what we're looking for; and that's what we've invited the wider community to help us with," he added.

Cyber-extortion

Ransomware strains of malware have been seen before, notably the earlier example of the Gpcode virus. Previous versions featured shorter keys and therefore weaker encryption.

The latest version of the virus uses a 1024-bit key, making the task of cracking the key particularly onerous. Cryptographic analysis by Kaspersky researchers thus far has broken key lengths of up to 660 bits. Crooks made errors in implementing the encryption algorithm in those cases, reducing the difficulty of cracking the code.

Strains of the Gpcode virus scramble user files of particular types (.doc, .txt, .pdf, .xls, .jpg, .png, .cpp, .h etc.) using an RSA encryption algorithm with varying bit lengths. After rendering ciphertext files unreadable the malware generates a message telling victims that their files have been encrypted in an attempt to extort payment for a decryption utility.

As Kaspersky Labs notes, backing up data and keeping up to date with security safeguards is the best defence against the malware. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.