Members
  • Total Members: 12818
  • Latest: martin
Stats
  • Total Posts: 28535
  • Total Topics: 8240
  • Online Today: 980
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)












Author Topic: Is it possible to hack Cryptolocker malware ?!  (Read 2156 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7206
  • KARMA: 291
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Is it possible to hack Cryptolocker malware ?!
« on: 14. December 2013., 08:34:09 »


Hot on the tail of devilish Cryptolocker comes: http://www.us-cert.gov/ncas/alerts/TA13-309A  & http://www.nationalcrimeagency.gov.uk/news/256-alert-mass-spamming-event-targeting-uk-computer-users , a copycat software nasty that holds victim's files to ransom – but the newcomer's encryption is potentially breakable, we're told.

Security startup IntelCrawler claims a "large-scale distribution" of the new so-called Locker malware began earlier this month.
 
Locker, once it has infected a PC, copies and encrypts a victim's documents, adding a ".perfect" extension, and then deletes the original data. The trojan also places a contact.txt file in each directory containing contact details of the malware author – usually a throwaway mobile phone number or an email address.

Victims are warned that if they harass or threaten the extortionist, the decryption key to unlock the files will be deleted, revealing the mindset of the scumbags behind the scam.

IntelCrawler contacted a crook listed in the contact file, and was told someone would have to pay up $150 to a Perfect Money or QIWI VISA Virtual Card number to receive the decryption key needed to restore the information on a Locker-infected machines.

In order to decrypt, you need to provide an identifying code written in the “contact.txt” file, as well as the hostname of the compromised computer.

"It seems to be the hackers just compare the list of infected IP addresses of the users together with their hostnames," according to IntelCrawler.

Locker is a rank amateur effort compared to the CryptoLocker crew, who run their scam using a network of command-and-control servers and use a combination of 256-bit AES and 2048-bit RSA crypto to hold data to ransom (the master key being held in the crims' servers).

But despite its less-advanced design, Locker has already managed to attack Windows-powered computers in the US, we're told – including Washington DC, Texas and Missouri – plus PCs in the Netherlands, Turkey, Germany and Russia. Locker also, we're told, avoids infecting machines running tools used by security researchers, a tactic undoubtedly aimed at ensuring the malware stays under the radar for as long as possible.

The software nasty spreads mostly by drive-by downloads from compromised websites. Executables disguised as MP3 files are another vector of infection.

The Locker malware uses the TurboPower LockBox library: http://sourceforge.net/projects/tplockbox/ , a cryptographic toolkit for Delphi: specifically, it uses AES-CTR for encrypting the contents of files on infected devices. But shortcomings in the programming will apparently make it possible for researchers to develop skeleton keys capable of unscrambling files on compromised kit. IntelCrawler's researchers are working on a universal antidote.

"We have found a decryption method and universal strings [keys] for decryption on any infected client," Andrey Komarov, IntelCrawler's chief exec, told El Reg.

Komarov added that detection of the malware by antivirus packages is low, with only Avira able to detect the pathogen as of Thursday evening: http://scforum.info/index.php/topic,208.0.html

(ElReg)

Samker's Computer Forum - SCforum.info

Is it possible to hack Cryptolocker malware ?!
« on: 14. December 2013., 08:34:09 »




devnullius

  • SCF VIP Member
  • *****
  • Posts: 3507
  • KARMA: 152
  • Gender: Female
    • SCForum.info
Re: Is it possible to hack Cryptolocker malware ?!
« Reply #1 on: 15. December 2013., 10:49:51 »

Komarov added that detection of the malware by antivirus packages is low, with only Avira able to detect the pathogen as of Thursday evening: http://scforum.info/index.php/topic,208.0.html
(ElReg)

WTF?? Avira??? Well I'll be damned - two wrongs sometimes do make a right ;p

devnullius
More information about bitcoin, altcoin & crypto in general? GO TO  j.gs/7385484/btc

Cuisvis hominis est errare, nullius nisi insipientis in errore persevare... So why not get the real SCForum employees to help YOUR troubled computer!!! SCF Remote PC Assist http://goo.gl/n1ONa9

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising