Ransomware in the wild again

A new trend in hijacking PCs and holding their users to ransom has been identified by a US security company.

A form of malware employing pay-by-phone extortion has been identified as a new means for cyber criminals to literally hold users' PCs to ransom.

The new 'ransomware,' as it's being called, locks up a user's PC and demands $35 (17.67) to renew bogus "browser security and anti-adware software" licences before returning control back to the user, a US security research firm said earlier this week.

The backdoor Trojan, identified by Florida-based Sunbelt Software as "Delf.ctk" is typically installed through security exploits, giving an attacker unauthorised access to a PC and the means to remotely control it without the user's knowledge.

The resulting fake Microsoft alert screens which lock up the system direct users to the internet protocol (IP) address of a payment processor of pornographic websites, 'passwordtwoenter.com' and a number of other similar sites.

Sunbelt chief executive, Alex Eckleberry, said in a blog posting on Monday that "you're completely locked out of the system" after the Trojan is run and installed, and that the only way to regain control is to pay the fee being demanded via phone numbers it lists.

Both the telephone numbers and websites sharing the passwordtoenter.com IP address trace back to a Seychelles-based company called Global Voice. But the company has failed to respond to email enquiries about the reports.

"Apparently, this is a payment processor that's now being used for malware, whether they know it or not," added Eckleberry.

Although ransomware is not a completely new cybercrime tactic, the last outbreak was reported over six months ago, when the Trojan horse "Gpcoder," froze user access to PC files for a ransom of $300 (151.44) a time.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022