Ransomware ‘Holds Up’ victims
(Publication) Google search: [1]
Ransomware ‘Holds Up’ victims | |
---|---|
![]() | |
Botnet | Rannoh |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / Wednesday, May 30, 2012 |
Editor/Conference | McAfee |
Link | http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims blogs.mcafee.com (blogs.mcafee.com Archive copy) |
Author | Sravan Ganachari |
Type |
Abstract
“ The current “ransomware” campaign uses a novel approach to extort money from naive Internet users. Malware from cybercriminals infects personal computers by claiming to be a genuine Windows update. Once installed, this malware encrypts data on the hard drive and displays a message (see Figure 1) in German that translates to “Your system has been infected with a Windows Trojan encryption due to visiting pages with pornographic content and your data files are encrypted with AES 256-bit encryption algorithm” and asks the victim to pay 100 euros via a Paysafe or Ukash voucher number. These malware binaries spread through spam emails.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1018, editor = {McAfee}, author = {Sravan Ganachari}, title = {Ransomware ‘Holds Up’ victims}, date = {30}, month = May, year = {2012}, howpublished = {\url{http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims blogs.mcafee.com}}, }