Ransomware in the wild again
A new trend in hijacking PCs and holding their users to ransom has been identified by a US security company.
A form of malware employing pay-by-phone extortion has been identified as a new means for cyber criminals to literally hold users' PCs to ransom.
The new 'ransomware,' as it's being called, locks up a user's PC and demands $35 (17.67) to renew bogus "browser security and anti-adware software" licences before returning control back to the user, a US security research firm said earlier this week.
The backdoor Trojan, identified by Florida-based Sunbelt Software as "Delf.ctk" is typically installed through security exploits, giving an attacker unauthorised access to a PC and the means to remotely control it without the user's knowledge.
The resulting fake Microsoft alert screens which lock up the system direct users to the internet protocol (IP) address of a payment processor of pornographic websites, 'passwordtwoenter.com' and a number of other similar sites.
Sunbelt chief executive, Alex Eckleberry, said in a blog posting on Monday that "you're completely locked out of the system" after the Trojan is run and installed, and that the only way to regain control is to pay the fee being demanded via phone numbers it lists.
Both the telephone numbers and websites sharing the passwordtoenter.com IP address trace back to a Seychelles-based company called Global Voice. But the company has failed to respond to email enquiries about the reports.
"Apparently, this is a payment processor that's now being used for malware, whether they know it or not," added Eckleberry.
Although ransomware is not a completely new cybercrime tactic, the last outbreak was reported over six months ago, when the Trojan horse "Gpcoder," froze user access to PC files for a ransom of $300 (151.44) a time.
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now