Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.
We've been warned lots of times about stealing data -- identity theft, phishing scams and pharming; we have at least heard of denial-of-service attacks and "zombie" computers, and now one more type of online attack has emerged: holding data for ransom. Extortionists remotely encrypt somebody's files and then demand money for the key to decode the information.
Experts say it is not yet a tendency; websites that used to infect users with the Trojan, have been put down. Besides, this program, Trojan.Pgpcoder, exploits a vulnerability in Microsoft Internet Explorer, which users should have patched as long ago as last July. However, there is no guarantee that such attacks won't appear in future, and all PCs will be patched at that time.
Websense, the San Diego-based Web security company, was the first to report such a case two weeks ago, when its customer fell victim to the attack.
Researchers at Symantec also have seen the malicious program used in the ransom attack. Oliver Friedrichs, a senior manager at Symantec Security Response said that attackers could use a website, email, or other means to distribute the Trojan.Pgpcoder and launch a widespread extortion campaign.
When the user visits a malicious website, his unpatched PC gets infected with a Trojan Horse (downloader-aag). This Trojan Horse downloader connects to another website, downloads the encoding application, and runs it.
The malicious encoding program searches for 15 common file types, including images and Microsoft Office files on the computer and encrypts them, and deletes the original files.
Then it creates a file with a ransom note called “Attention!!!”, where demands $200 for a tool needed to decrypt the files.
However, there is a weak spot in the attackers' scheme. It is possible to trace the money and to catch the extortionists when they try to collect the ransom. Maybe, it will prevent this kind of cybercrime from spreading.
Time will show whether we see this Trojan attack again or something similar appears and there will be a real need for a name for such type of Trojans -- how do you like "ransomware"? I have already seen this word used, but let's hope for the best.
Anyway, it is always wise of users to keep anti-virus and security software up-to-date and back up data. Just to be on the safe side.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Your computer is as slow as molasses. Your mouse freezes... Read More
Some months ago, before there was much publicity regarding phishing... Read More
If you know what is the 'Fishing' then it's very... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Huge number of spyware software applications are available in the... Read More
In a word, no - an email message has always... Read More
Be careful of sites that promise to send you "instant... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Since its birth, the Internet has grown and expanded to... Read More
This is the second in a series of articles highlighting... Read More
So you want to know who your kids are chatting... Read More
Do you sometimes notice your computer running slower. Is your... Read More
With the Internet entering our lives in such an explosive... Read More
There has not been a time in the history of... Read More
If you use emails actively in your communication, you must... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
So called phishers try to catch the information about the... Read More
Internet scams and frauds are on the rise! The quantity... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
The first thing people think about when defending their computers... Read More
Today the internet is a mine field of malicious code... Read More
Pharming is one of the latest online scams and rapidly... Read More
Despite the current wave of identity theft and corporate security... Read More
A week or so ago, I received an inquiry from... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Shopping for horse gifts or other gift items on the... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
A couple of days ago, I was searching for a... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Long gone are the days that we could feel secure... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
If you have used a Windows machine for a while,... Read More
There are several basic concepts to keep in mind when... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
When it comes to reporting Internet scams most of us... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
While clicking from site to site on the internet you... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Since its birth, the Internet has grown and expanded to... Read More
Nowadays more and more people are using a computer. A... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Sooner or later everyone with an email account will receive... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Over the past few years as the internet has become... Read More
If you constantly deal with bank or electronic accounts, it... Read More
You'd better learn news from media, not from emails, security... Read More
First I would like to stress I am condoning the... Read More
As the number of people using the Internet as an... Read More
If you are a parent, as am I, I think... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Have you ever got an email asking you to confirm... Read More
Much has been said on the theory of password protection... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
As soon as almost all computer users already got used... Read More
History and BackgroundThe virus was one of the first ever... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
I got a virus the other day, Thursday I believe... Read More
P C. owners are constantly at risk from attacks by... Read More
Well, this is an article I never thought I would... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Every day millions of people go online to find information,... Read More
The Threat10 years ago you could probably have run no... Read More
Internet Security |