Featured Articles

Nvidia adjusts GTX 980 and GTX 970 pricing

Nvidia adjusts GTX 980 and GTX 970 pricing

It appears that Nvidia has been feeling the pulse of the market and took some note from comments regarding the original…

More...
iPhone 6 and 6 Plus reviews are up and they are good

iPhone 6 and 6 Plus reviews are up and they are good

Apple is dancing the same dance year after year. It releases the iPhone and two days before they start shipping it…

More...
Amazon announces three new tablets

Amazon announces three new tablets

Amazon has just released three new tablets starting with the $99 priced 6-inch Kindle Fire HD6. This is a 6-inch tablet…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Nvidia Shield Tablet 32GB 4G LTE out for pre orders

Nvidia Shield Tablet 32GB 4G LTE out for pre orders

Nvidia has finally revealed the shipping date of its Shield Tablet 32GB in 4G LTE flavour and in case you pre-order…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Tuesday, 24 December 2013 14:44

Cryptolocker infects 250,000 computers

Written by Nick Farrell



Crims have extorted a million from victims

Dell Secureworks estimated that 250,000 systems have been infected globally in the first 100 days of the CryptoLocker threat and more than a million dollars has been given to buy the cyber criminals off. CryptoLocker is ransomware which encrypts user's important files and then demands money in return for decrypting them.

Dell Secureworks said that the criminals have managed to amass 1,216 bitcoins since September. Had the hackers immediately exchange bitcoins into dollars, the cash pile would have amounted to $380,000. If however, they held onto the money and exchanged them as of last week, that figure rises to $980,000, based on the current weighted price of $804/BTC. Even if Cryptolocker is removed, there is no way the encrypted files can be decrypted. Decryption keys are stored on one of many Cryptolocker servers. The files can only be restored by paying the ransom.

The authors of Cryptolocker have created a robust program that is difficult to circumvent," SecureWorks said in a blog post. "Instead of using a custom, cryptographic implementation like many other malware families, Cryptolocker uses strong third-party certified cryptography offered by Microsoft's CryptoAPI."

The malware has targeted English-speakers, specifically those located in the United States. "Malware authors from Russia and Eastern Europe, where the CryptoLocker authors are thought to originate, commonly target victims in North America and Western Europe," the researchers said.

Early versions of the malware were distributed through spam targeting businesses and threatened them with a customer complaint to get them to open the file.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments