Ransomware ‘Holds Up’ victims

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Ransomware ‘Holds Up’ victims
Ransomware Holds Up victims.png
Botnet Rannoh
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / Wednesday, May 30, 2012
Editor/Conference McAfee
Link http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims (Archive copy)
Author Sravan Ganachari
Type

Abstract

The current “ransomware” campaign uses a novel approach to extort money from naive Internet users. Malware from cybercriminals infects personal computers by claiming to be a genuine Windows update. Once installed, this malware encrypts data on the hard drive and displays a message (see Figure 1) in German that translates to “Your system has been infected with a Windows Trojan encryption due to visiting pages with pornographic content and your data files are encrypted with AES 256-bit encryption algorithm” and asks the victim to pay 100 euros via a Paysafe or Ukash voucher number. These malware binaries spread through spam emails.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1018,
   editor = {McAfee},
   author = {Sravan Ganachari},
   title = {Ransomware ‘Holds Up’ victims},
   date = {30},
   month = May,
   year = {2012},
   howpublished = {\url{http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims}},
 }