Feeds

File-NUKING Cryptolocker PC malware MENACES 'TENS of MILLIONS' in UK

Back up before devil PC malware demands 860 BUCKS (530 quid)

Choosing a cloud hosting partner with confidence

The infamous Cryptolocker malware, which encrypts your computer files and demands a payment of £534 ($860) to unlock them, may have been sent to "tens of millions" of Brits, Blighty's crime-busters warned today.

According to an alert from the UK National Crime Agency (NCA), a fresh round of ransomware-loaded spam posing as bank notices has been sent out, with small and medium-sized businesses targeted in particular. The messages, described as a "significant risk", carry booby-trapped attachments and claim to be official documents from financial institutions.

Lurking within the attachments is a Trojan called Cryptolocker that, when executed, silently installs itself and quietly begins encrypting documents one by one on the Windows PC using tough-as-nails AES256. When it's finished, it demands a ransom payment of 2 Bitcoins (at least 500 quid or 800 bucks) to decrypt the data, which must be paid within a time limit.

The software nasty is particularly fiendish: The malware first contacts its master's control server, which generates a new public-private 2048-bit RSA cryptographic key pair and sends the public half to the malware.

Then for every file discovered on the computer, Cryptolocker generates a new 256-bit key and uses it to encrypt that document using the virtually unbreakable AES256 algorithm. That AES key is then encrypted using the RSA public key and stored with the obfuscated document.

Only when the victim pays up does the Trojan download the private half of the RSA key, which is used to decrypt the per-file AES keys and ultimately restore all the protected documents. Targeted files include anything with .doc, .docx, .xls, .xlsx, .ppt, .pptx, .dwg, .dxf, .dxg and .jpg extensions and plenty more.

Users are urged to maintain regular backups of their data, kept separate from their computers, as the encryption is essentially uncrackable, and consider using tools to thwart the software nasty. The Trojan infects systems running Windows 8, Windows 7, Vista, and XP.

"The emails may be sent out to tens of millions of UK customers, but appear to be targeting small and medium businesses in particular," the UK's NCA said.

"This spamming event is assessed as a significant risk."

Cryptolocker's operators are also apparently developing a keen sense of economic opportunism, upping their Bitcoin demands at a time when the digital currency's exchange rate has never been higher.

While authorities have yet to finger any suspects behind the Cryptolocker epidemic, the NCA believes the operation is the work of a tech-savvy crime ring.

"The NCA are actively pursuing organized crime groups committing this type of crime," said Les Miles, deputy head of the NCA's National Cyber Crime Unit.

"We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public."

In addition to installing and updating trusted security software, users and administrators can protect against infections by using best practices (read: common sense) such as avoiding links and attachments from unknown or suspicious sources and scanning all attached files for malware. ®

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.