Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.
We've been warned lots of times about stealing data -- identity theft, phishing scams and pharming; we have at least heard of denial-of-service attacks and "zombie" computers, and now one more type of online attack has emerged: holding data for ransom. Extortionists remotely encrypt somebody's files and then demand money for the key to decode the information.
Experts say it is not yet a tendency; websites that used to infect users with the Trojan, have been put down. Besides, this program, Trojan.Pgpcoder, exploits a vulnerability in Microsoft Internet Explorer, which users should have patched as long ago as last July. However, there is no guarantee that such attacks won't appear in future, and all PCs will be patched at that time.
Websense, the San Diego-based Web security company, was the first to report such a case two weeks ago, when its customer fell victim to the attack.
Researchers at Symantec also have seen the malicious program used in the ransom attack. Oliver Friedrichs, a senior manager at Symantec Security Response said that attackers could use a website, email, or other means to distribute the Trojan.Pgpcoder and launch a widespread extortion campaign.
When the user visits a malicious website, his unpatched PC gets infected with a Trojan Horse (downloader-aag). This Trojan Horse downloader connects to another website, downloads the encoding application, and runs it.
The malicious encoding program searches for 15 common file types, including images and Microsoft Office files on the computer and encrypts them, and deletes the original files.
Then it creates a file with a ransom note called “Attention!!!”, where demands $200 for a tool needed to decrypt the files.
However, there is a weak spot in the attackers' scheme. It is possible to trace the money and to catch the extortionists when they try to collect the ransom. Maybe, it will prevent this kind of cybercrime from spreading.
Time will show whether we see this Trojan attack again or something similar appears and there will be a real need for a name for such type of Trojans -- how do you like "ransomware"? I have already seen this word used, but let's hope for the best.
Anyway, it is always wise of users to keep anti-virus and security software up-to-date and back up data. Just to be on the safe side.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Many of us have run into an annoying and time-consuming... Read More
While clicking from site to site on the internet you... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Since its birth, the Internet has grown and expanded to... Read More
Paypal is a great site and is used by many... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Someone recently told me, "You would have to be a... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
As more people are logging onto the Internet everyday, Network... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
I got a virus the other day, Thursday I believe... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
It's late. You've been scouring the web for that perfect... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Only the top spyware removers are successful at detecting and... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
There has not been a time in the history of... Read More
There are several basic concepts to keep in mind when... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Pharming is one of the latest online scams and rapidly... Read More
You and I are a lot alike. We are both... Read More
There are ways to insure security though. You can get... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
As soon as almost all computer users already got used... Read More
When surfing the Internet you probably take your anonymity for... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
History and BackgroundThe virus was one of the first ever... Read More
At this point, if you've got the whole "turning the... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Someone recently told me, "You would have to be a... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Over £5 billion pounds was spent on online shopping in... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
The Threat10 years ago you could probably have run no... Read More
Computer security for most can be described in 2 words,... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
No longer are viruses the only threat on the internet.... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Despite the current wave of identity theft and corporate security... Read More
As more people are logging onto the Internet everyday, Network... Read More
In today's times spyware is a very serious issue and... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Let us take the example of scrambling an egg. First,... Read More
With the advent of the World Wide Web, a whole... Read More
Before we start, I want to make it clear that... Read More
When surfing the Internet you probably take your anonymity for... Read More
You may not realize it, but as you are surfing... Read More
Over the past few years as the internet has become... Read More
A new variation of the Nigerian Scam theme ... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
You'd better learn news from media, not from emails, security... Read More
The most frustrating part of having Spyware on your computer... Read More
Today the internet is a mine field of malicious code... Read More
Internet Security |