Fake cop Trojan 'detects offensive materials' on PCs, demands money
Crooks exploit those embarrassing files we all have
Security firms are warning about a rash of police-themed ransomware attacks.
The Reveton Trojan warns victims that illegal content has supposedly been detected on infected machines, displaying a message supposedly from local police agencies demanding payment to unlock machines.
To unlock an infected machine, marks are invited to purchase a Paysafecard and pay €100 to obtain an unlock code. But in reality users need not hand over any dosh to regain control of their PCs. Control of infected machines can be established by following a few simple steps, as outlined in a blog post by F-Secure here. Similar recovery instructions from Microsoft can be found here.
Cybercrooks are obviously hoping that victims will be panicked into complying with their demands without seeking external help.
"Even when somebody is savvy enough to recognise the message is a fake, the malware's accusations of offensive materials having been discovered on the user's hard drive creates a chilling effect, which has likely prevented some folks from seeking outside help," the Finnish security firm notes.
Trend Micro reckons some of the people peddling the Reveton Trojan were also involved in the high-profile DNSChanger Trojan scam, the target of a successful Microsoft takedown operation last November.
"The same people peddling this Trojan are also heavily involved in other malware and are very invested in this business," writes David Sancho, a senior threat researcher at Trend Micro. "For instance, we have found that they were affiliates of the DNSChanger Trojan program called Nelicash that Rove Digital was sponsoring for a few years.
"The main persons behind Rove Digital were arrested on November 8 2011 after a two year investigation by the FBI, the NASA Office of the Inspector General and Estonian police in collaboration with Trend Micro and other industry partners. So we might have found an important clue who is behind the police Trojan." ®
What have you got
against footcare implements.
Re: Easy to fix (a couple of months ago)
You seem to be short of a few factoids. Windows does have file ownership*, and you cannot delete the files of other users unless the permissions allow. Therefore you will have to do a "run as administrator" on the tool you use to delete the files, just as you would have to sudo on Linux.
So now you can really be embarrassed.
* Note to the anal, this applies to NTFS only, which of course is the standard FS for Windows installs since Windows 2K.
Re: you'd have to be terminally thick to fall for them
Luckily for the scammers, one thing of which there will never be a shortage, is terminally thick people. (Average person = pretty thick; ergo, 50% of population is more thick than that.)
Windows user icon, natch.