IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Microsoft spots malware posing as police

The ransomware asks users to pay up for using dodgy web material, including porn and terrorist emails.

Police

Microsoft has spotted various kinds of localised malware attempting to dupe users by posing as messages from police forces.

Otherwise known as ransomware, the malicious software renders computers unusable and then demands payment from the target if they want their machine to work again.

The malware authors in recent cases have posed as police authorities, including the UK's Met, asking users to pay a fine for purported use of illegal material, Microsoft explained.

In the unfortunate case that your computer is infected with this malware, don't even consider paying.

The messages claim the user has accessed child pornography and emails "with terrorist background." Those who do pay do not get their computer fixed.

"In order to make the computer functional again, the user is asked to transfer money via a legitimate online payment service, such as Paysafecard or Ukash, to the supposed authorities," said Horea Coroiu, from the Microsoft Malware Protection Centre, in a blog post.

"A quite interesting fact is that the geographical distribution for most of the samples coincides well with the targeted countries. In the case of Trojan:Win32/Ransom.DU, which is a generic detection for a German-language variant of the ransomware that impersonates the German Federal Police, 91.59 per cent of the samples we received from July to November this year were found in Germany."

As for how the malware gets on machines, Microsoft found simple drive-by-downloads were to blame, with the Blackhole Exploit Kit used to infect systems.

Microsoft said several spam campaigns contained links to the exploit kit, some of which is generated by the notorious Cutwail botnet.

"The good news is that no zero-day exploits that we know of are involved, so keeping your software up to date will considerably reduce the likelihood of infection," Coroiu added.

"In the unfortunate case that your computer is infected with this malware, don't even consider paying. If you do so, your computer will not get unlocked anyway, so paying does not actually solve your computer problem."

Microsoft recently gifted IT departments one of the year's heftier Patch Tuesdays, covering 20 vulnerabilities.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT
ransomware

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

18 Nov 2021
US and Israel join forces to fight ransomware
ransomware

US and Israel join forces to fight ransomware

15 Nov 2021

Most Popular

Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
How full-stack observability can accelerate IT innovation
Sponsored

How full-stack observability can accelerate IT innovation

3 May 2022