Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.
We've been warned lots of times about stealing data -- identity theft, phishing scams and pharming; we have at least heard of denial-of-service attacks and "zombie" computers, and now one more type of online attack has emerged: holding data for ransom. Extortionists remotely encrypt somebody's files and then demand money for the key to decode the information.
Experts say it is not yet a tendency; websites that used to infect users with the Trojan, have been put down. Besides, this program, Trojan.Pgpcoder, exploits a vulnerability in Microsoft Internet Explorer, which users should have patched as long ago as last July. However, there is no guarantee that such attacks won't appear in future, and all PCs will be patched at that time.
Websense, the San Diego-based Web security company, was the first to report such a case two weeks ago, when its customer fell victim to the attack.
Researchers at Symantec also have seen the malicious program used in the ransom attack. Oliver Friedrichs, a senior manager at Symantec Security Response said that attackers could use a website, email, or other means to distribute the Trojan.Pgpcoder and launch a widespread extortion campaign.
When the user visits a malicious website, his unpatched PC gets infected with a Trojan Horse (downloader-aag). This Trojan Horse downloader connects to another website, downloads the encoding application, and runs it.
The malicious encoding program searches for 15 common file types, including images and Microsoft Office files on the computer and encrypts them, and deletes the original files.
Then it creates a file with a ransom note called “Attention!!!”, where demands $200 for a tool needed to decrypt the files.
However, there is a weak spot in the attackers' scheme. It is possible to trace the money and to catch the extortionists when they try to collect the ransom. Maybe, it will prevent this kind of cybercrime from spreading.
Time will show whether we see this Trojan attack again or something similar appears and there will be a real need for a name for such type of Trojans -- how do you like "ransomware"? I have already seen this word used, but let's hope for the best.
Anyway, it is always wise of users to keep anti-virus and security software up-to-date and back up data. Just to be on the safe side.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Identity theft ? also known as ID theft, identity fraud... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Identity theft is one of the most common criminal acts... Read More
First I would like to stress I am condoning the... Read More
Pharming is one of the latest online scams and rapidly... Read More
We all know that it's dangerous to use the same... Read More
Much has been said on the theory of password protection... Read More
Identity theft rates one of the fastest growing crimes in... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
In the past I've never really paid much attention to... Read More
If you use the internet, you have probably been infected... Read More
If you are wondering how to fight spyware for safe... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Internet scams and frauds are on the rise! The quantity... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
This is the second in a series of articles highlighting... Read More
Today,on most internet user's computers, we have the ability to... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Ok, ok, I know you've seen them. All those pop... Read More
If you use emails actively in your communication, you must... Read More
First, let's do a little recap'. As I stated in... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
File sharing on p2p is soaring despite the music and... Read More
It has been said that with the wealth of information,... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Some months ago, before there was much publicity regarding phishing... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Do you really have to know how feeds work? Not... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
I am the victim of an internet scam. It is... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Can you protect your computer from all possible viruses and... Read More
Having a good Spyware eliminator on your computer is vital... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Computer infections can be broken up into 4 main categories... Read More
Phishing is the act of some individual sending an email... Read More
By browsing a web page, you could infect your computer... Read More
Paypal is a great site and is used by many... Read More
With the Internet entering our lives in such an explosive... Read More
The most frustrating part of having Spyware on your computer... Read More
Huge number of spyware software applications are available in the... Read More
If you have used a Windows machine for a while,... Read More
There is no doubt that "how-to articles" have become a... Read More
A little bit of time invested into learning about internet... Read More
We all know that it's dangerous to use the same... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
There are ways to insure security though. You can get... Read More
There you are busily typing away on your PC or... Read More
Do you sometimes notice your computer running slower. Is your... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Shopping for horse gifts or other gift items on the... Read More
In a word, no - an email message has always... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
If you run any type of Internet business, Adware and... Read More
The trash folder in my main inbox hit 4000 today.... Read More
We all get the odd virus now and then, but... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Every single time you access a website, you leave tracks.... Read More
Internet Security |