Security

How cybercrooks made $330K from ransomware without really trying

Ker-ching!

By John Leyden

6 SHARE

The small cybercrime ring behind the CryptoWall 3.0 ransomware was able to collect more than $330,607 in ransom from 670 victims, according to new research.

The figures, published by security firm Imperva, are based on an analysis [PDF] of Bitcoin wallets linked to malware-wielding extortists.

Security researchers discovered that cybercrooks demand different amounts based on the geographical location of their victims.

The ransom amount in the US is $700, a figure that gets reduced to $500 for victims in Israel, Russia, and Mexico. Imperva was able to identify around 1,217 BTC ($337,607) being paid out in ransom in a short period.

A deeper follow-up study would likely identify many more wallets. Imperva concedes it is focusing on one small group that's involved in a much bigger scam.

CryptoWall 3.0 operates by encrypting data on compromised machines before demanding a payment (payable in BitCoins) for the private key that may be necessary to unscramble files and recover their contents.

The FBI received nearly 1,000 complaints between April 2014 and June 2015 from CryptoWall victims reporting combined losses of over $18 million. The true losses are likely to be a lot higher than this. Industry group the Cyber Threat Alliance (CTA) estimated in October that CryptoWall in its various guises is to blame for $325 million in losses.

The estimate – which seems high – comes from combined threat research and intelligence from the founding and contributing members of the CTA (Symantec, Palo Alto Networks, Fortinet and Intel Security). ®

Sign up to our NewsletterGet IT in your inbox daily

6 Comments

More from The Register

If you're using Oracle's WebLogic Server, check for security fixes: Bug exploited in the wild to install ransomware

Big Red rushes out software patch as ransomware scumbags move in

Ransomware attackers have gone from 'spray and pray' to 'slayin' prey'

Black Hat Don't believe the numbers, say security watchers, it's worse than ever

Smash GandCrab: Free tools released to decrypt files scrambled by notorious ransomware

Bitdefender teams up with FBI, cops to rescue Windows PC documents

Today's Resident Evil: Ransomware crooks think local, not global, prey on schools, towns, libraries, courts, cities...

Small governments make up two-thirds of infection victims observed by infosec bods

The Pwn Star State: Nearly two dozen Texas towns targeted by tiresome ransomware

Officials suspect a coordinated extortion campaign

When you think how infamous NHS-pwning malware's still hitting the unwary, it'll make you WannaCry – Kaspersky

Ransomware strain was top customer call-out title in 2018

Pharma-testing biz Eurofins Scientific says it fell victim to 'new version' of malware

No data nicked in weekend attack but systems and server pulled to contain infection

Brit Police Federation cops to ransomware attack on HQ systems

Sort-of union for bobbies has triggered criminal investigation

As the world secures itself, so do crims: Encrypted malware on the rise, warns Sonicwall

Let's be careful out there

It woz ransomware wot did it: ConnectWise spills beans on cause for day-long outage

Hackers got in via offsite machine used for cloud performance testing