Popcorn Time ransomware wants you to hack your friends

Ransomware offers decryption tool if you phish others

Hackers are using a new tactic to spread ransomware by getting victims to do the dirty work of infection themselves.

Criminals behind a ransomware variant known as "Popcorn Time" (which is completely unrelated to a video streaming Bittorent client of the same name) have told victims they can avoid having to pay a one bitcoin ransomware if they agreed to infect two other users.

The ransomware was discovered by researchers at MalwareHunterTeam. According to Bleeping Computer, if a victim incorrectly enters the wrong decryption code in four times, their data gets deleted completely.

The malware targets files found in My Documents, My Pictures, My Music and on the desktop. They are then scrambled using AES-256 encryption and labelled with a .filock extension. The authors of the malware claim the money will be used to provide food and shelter for refugees in Syria.

Victims that choose to infect others are given a "referral" URL which they then must send on to two other unsuspecting victims. Should those links get used to infect other systems, the initial victim gets a free decryption key. The URL points to the ransomware's Tor server.

The malware is very much a work in progress, Bleeping Computer reports. Users have been warned to not click on links they don't recognise, even if they come from people they know. Userss should also have backups of data stored on a separate drive should they fall victim to such malware.

A recent report from Kaspersky suggests ransomware attacks have significantly increase over the last 12 months from one every two minutes to one every 40 seconds for businesses, while for individuals the rate increased from every 20 seconds to every 10 seconds. SMBs were hardest hit, with 42% of them falling victim to a ransomware attack over the past 12 months.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

What are biometrics?
Security

What are biometrics?

27 Nov 2020
Black Friday's best antivirus deals
Security

Black Friday's best antivirus deals

27 Nov 2020
Veritas Access Appliance with IBM Spectrum® Protect
Server & storage

Veritas Access Appliance with IBM Spectrum® Protect

27 Nov 2020
Ransomware protection with Veritas NetBackup Appliances
Security

Ransomware protection with Veritas NetBackup Appliances

27 Nov 2020

Most Popular

80% of cyber professionals say the Computer Misuse Act is working against them
Security

80% of cyber professionals say the Computer Misuse Act is working against them

20 Nov 2020
Cisco acquires container security startup Banzai Cloud
Security

Cisco acquires container security startup Banzai Cloud

18 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020