Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

New virus seeks 'ransom' for computer files


  • Please log in to reply

#1
Retired Tech

Retired Tech

    Retired Staff

  • Retired Staff
  • 20,563 posts
WASHINGTON (AFP) - In the equivalent of a holdup in cyberspace, a new computer bug locks up a user's file with encryption and demands a 300-dollar "ransom," security experts say.

The so-called "ransomware" Trojan was discovered Saturday by the security firm LURHQ, which said it was based on a similar scheme perpetrated 15 years ago.

Users whose computers are infected receive an e-mail stating that their files have been encrypted and will not be unlocked unless they transfer 300 dollars to a special account.

In poorly written English, the message said, "Do not try to search for a program what encrypted your information -- it simply do not exists in your hard disk anymore. If you really care about documents and information in encrypted files, you can pay using electronic currency 300 dollars. Reporting to police about a case will not help you."

LURHQ said it was not clear how the Trojan was spread, but experts said it could be through infected e-mails or from visiting certain websites.

"Infection reports are not widespread, so it is not believed this is a mass threat by any means," LURHQ said.

"Malware of this nature is actually more successful when it is delivered in low volumes, as it is less likely that anti-virus vendors will have detection for it, and more attention means the likely closing of the accounts used for the anonymous money transfer."

The Trojan "is bold as brass, scooping up your valuable data and locking it away until you agree to pay the ransom to the criminals who have 'kidnapped' your files." said Graham Cluley, senior technology consultant for the security firm Sophos.

"Companies who have made regular backups may be able to recover easily, but less diligent businesses may be in a quandary about whether to cough up the cash."

However Sophos and LURHQ discovered the password -- C:/Program Files/Microsoft Visual Studio/VC98 -- a code disguised as a file.

"So there should be no need for anyone unfortunate enough to have suffered from this ransomware attack to have to pay the reward to the criminals behind it," Cluley said.
  • 0

Advertisements


#2
frinkulator

frinkulator

    Member

  • Member
  • PipPip
  • 53 posts
Any idea what countries it is currently surfacing in? I am interested in what's happening. To think that something like that could actually do that... if you kept a backup of your files that would help. Say you had a USB or Hard Drive plugged in, would they be able to encrypt that as well?
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP