Feeds

You've got two weeks to beat off Cryptolocker, GameoverZeus nasties

So say UK cops after control servers for malware battered

5 things you didn’t know about cloud backup

The UK’s National Crime Agency has warned people have just two weeks to protect themselves against the Cryptolocker ransomware and a strain of the ZeuS password-slurping malware – before both return from the dead.

The alert comes after the cops "disrupted" the systems remotely controlling the software nasties – which could mean anything from knocking them offline to physically seizing machines. The cyber-plod isn't saying.

The NCA worked with the FBI, Europol and other agencies to knackered the command and control (C&C) servers that were managing a major network distributing the GameoverZeuS Trojan and the infamous Cryptolocker ransomware.

NCE operatives warned that it’s only a matter of time before the miscreants behind the botnet set up new C&C servers and regain control.

The agency said the standoff “will give the UK public a unique, two-week opportunity to rid and safeguard themselves” from both GameoverZeuS and Cryptolocker. However, Rik Ferguson, veep of security research at Trend Micro, said in a blog post that folks may not even have that long.

“The ultimate goal of the law enforcement activity is to prevent infected computers from communicating with one another, significantly weakening the criminal infrastructure. While this blow is effective, it is not permanent and we expect the malicious networks to return to their former strength within weeks, if not days,” he warned.

People are being advised to install or update security software and to check that operating systems and applications are up to date. Folks should also back up important data onto unconnected storage, while businesses need to check their incident response and resilience protocols.

More than 15,000 computers in Blighty alone have been hit by the ZeuS malware, which figure includes those hit by the GameoverZeuS and P2PZeuS strains. According to the NCA, ZeuS is responsible for nicking hundreds of millions of pounds globally.

Once downloaded onto a machine, and decrypted, GameoverZeuS starts sniffing around for bank account passwords and other financially sensitive info. If it can’t find anything useful, some strains of the software will “call in” Cryptolocker, a form of ransomware that encrypts the victim's device unless they pay a ransom to have it decrypted. The going rate for the ransom is about one Bitcoin (£200 to £300) in the UK, according to the NCA.

Although ISPs have started advising their users about the threat, the NCA urged users to immediately sort out their security software.

“Nobody wants their personal financial details, business information or photographs of loved ones to be stolen or held to ransom by criminals. By making use of this two-week window, huge numbers of people in the UK can stop that from happening to them,” said Andy Archibald, deputy director of the NCA’s National Cyber Crime Unit.

“Our message is simple: update your operating system and make this a regular occurrence, update your security software and use it and, think twice before clicking on links or attachments in unsolicited emails.” ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?