Popcorn Time ransomware wants you to hack your friends

Ransomware offers decryption tool if you phish others

Hackers are using a new tactic to spread ransomware by getting victims to do the dirty work of infection themselves.

Criminals behind a ransomware variant known as "Popcorn Time" (which is completely unrelated to a video streaming Bittorent client of the same name) have told victims they can avoid having to pay a one bitcoin ransomware if they agreed to infect two other users.

Advertisement - Article continues below

The ransomware was discovered by researchers at MalwareHunterTeam. According to Bleeping Computer, if a victim incorrectly enters the wrong decryption code in four times, their data gets deleted completely.

The malware targets files found in My Documents, My Pictures, My Music and on the desktop. They are then scrambled using AES-256 encryption and labelled with a .filock extension. The authors of the malware claim the money will be used to provide food and shelter for refugees in Syria.

Victims that choose to infect others are given a "referral" URL which they then must send on to two other unsuspecting victims. Should those links get used to infect other systems, the initial victim gets a free decryption key. The URL points to the ransomware's Tor server.

The malware is very much a work in progress, Bleeping Computer reports. Users have been warned to not click on links they don't recognise, even if they come from people they know. Userss should also have backups of data stored on a separate drive should they fall victim to such malware.

Advertisement - Article continues below
Advertisement - Article continues below

A recent report from Kaspersky suggests ransomware attacks have significantly increase over the last 12 months from one every two minutes to one every 40 seconds for businesses, while for individuals the rate increased from every 20 seconds to every 10 seconds. SMBs were hardest hit, with 42% of them falling victim to a ransomware attack over the past 12 months.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now



University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020

How to find RAM speed, size and type

24 Jun 2020

The road to recovery

30 Jun 2020