Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Ransom Trojan Uses Cryptography for Malicious Purpose > NetSparsh - Viral Content you Love & Share

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.

We've been warned lots of times about stealing data -- identity theft, phishing scams and pharming; we have at least heard of denial-of-service attacks and "zombie" computers, and now one more type of online attack has emerged: holding data for ransom. Extortionists remotely encrypt somebody's files and then demand money for the key to decode the information.

Experts say it is not yet a tendency; websites that used to infect users with the Trojan, have been put down. Besides, this program, Trojan.Pgpcoder, exploits a vulnerability in Microsoft Internet Explorer, which users should have patched as long ago as last July. However, there is no guarantee that such attacks won't appear in future, and all PCs will be patched at that time.

Websense, the San Diego-based Web security company, was the first to report such a case two weeks ago, when its customer fell victim to the attack.

Researchers at Symantec also have seen the malicious program used in the ransom attack. Oliver Friedrichs, a senior manager at Symantec Security Response said that attackers could use a website, email, or other means to distribute the Trojan.Pgpcoder and launch a widespread extortion campaign.

When the user visits a malicious website, his unpatched PC gets infected with a Trojan Horse (downloader-aag). This Trojan Horse downloader connects to another website, downloads the encoding application, and runs it.

The malicious encoding program searches for 15 common file types, including images and Microsoft Office files on the computer and encrypts them, and deletes the original files.

Then it creates a file with a ransom note called “Attention!!!”, where demands $200 for a tool needed to decrypt the files.

However, there is a weak spot in the attackers' scheme. It is possible to trace the money and to catch the extortionists when they try to collect the ransom. Maybe, it will prevent this kind of cybercrime from spreading.

Time will show whether we see this Trojan attack again or something similar appears and there will be a real need for a name for such type of Trojans -- how do you like "ransomware"? I have already seen this word used, but let's hope for the best.

Anyway, it is always wise of users to keep anti-virus and security software up-to-date and back up data. Just to be on the safe side.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

The Verge

Google discloses Microsoft Edge security flaw before a patch is ready
The Verge
Microsoft and Google have been bitter rivals for at least a decade, and the pair have had several disagreements over security vulnerability disclosure in recent years. Google is stoking those disagreements again this week by disclosing a Microsoft Edge ...
Edge browser suffers security flaw which Microsoft failed to fix on timeTechRadar

all 11 news articles »

New York Magazine

Kelly Orders Changes to Security Clearance Process at White House
New York Magazine
White House chief of staff John Kelly has approved an overhaul of how the White House handles temporary security clearances after facing bipartisan pressure in the wake of the Rob Porter scandal. Porter, the former White House staff secretary, had been ...
John Kelly overhauls White House security clearancesVox
Chief of Staff Orders an Overhaul for Security ClearancesNew York Times
Chief Of Staff Kelly Wants New White House Security Clearance RulesNPR
CNN -Axios -Washington Post -Washington Post
all 288 news articles »

CBS News

Should we rethink school shootings as a homeland security threat?
CBS News
When a 29-year-old man from Uzbekistan plowed a truck into a crowd of people in Manhattan in October, killing eight, President Trump's response to the attack as a matter of homeland security was swift. Within hours, the president decried the attack and ...

and more »

Bloomberg

Three Things Worrying the Global Security Establishment
Bloomberg
After a year of U.S. President Donald Trump, the trans-Atlantic security establishment seems unsure whether to be relieved that a major war hasn't begun on his watch or alarmed at the scale of emerging risks. Speeches and panel discussions at the ...
The Munich Security Conference is one of the premier global forums, so what's with the malaise?Washington Post
'Do not test Israel's resolve,' Netanyahu tells Iran at Munich Security ConferenceFRANCE 24
Hot Debate Around Iran Nuclear Deal on Final Day of Munich Security ConferenceSputnik International

all 324 news articles »

Reuters

Carnival probes security personnel's response to brawl in South Pacific cruise
Reuters
SYDNEY (Reuters) - Carnival Corp (CCL.N), the world's largest cruise operator, said on Monday it was investigating the response of its security personnel to a brawl that broke out on one of its South Pacific cruises that resulted in 23 passengers being ...

and more »

Business Insider

A Secret Service agent tackled a Chinese security official over the nuclear football when Trump visited China
Business Insider
The news website Axios reported on Sunday that a Secret Service member tackled a Chinese security official during President Donald Trump's trip to China in November. The incident reportedly began when the Chinese security detail tried to prevent the ...
Chinese, US security officials scuffled over 'nuclear football' during Trump trip, says reportSouth China Morning Post
John Kelly and Secret Service agent scuffled with Chinese security officials over nuclear 'football' in Beijing ...The Japan Times
US and China reportedly scuffled over nuclear 'football' during Trump's Beijing visitCNBC
Mediaite
all 40 news articles »

Engadget

Air Force security hackathon leads to record payout
Engadget
The US Air Force's second security hackathon has paid dividends... both for the military and the people finding holes in its defenses. HackerOne has revealed the results of the Hack the Air Force 2.0 challenge from the end of 2017, and it led to ...


Los Angeles Times

USC students explore civil rights, national security in university's first history class on WWII internment
Los Angeles Times
USC student Matthew Weisbly has Jewish and Japanese relatives who experienced the Holocaust and internment. (Christina House / Los Angeles Times). USC faculty member Susan Kamei was struck by discomforting moments of deja vu during the 2016 ...


Bloomberg

Electric Vehicles May Raise India's Risk of Cyber-Security Breaches
Bloomberg
India's dependence on imported components for electric vehicles could make the country vulnerable to cyber-security breaches, according to the government's chief policy think-tank. India should manufacture the majority of the parts needed for its ...

and more »

ZDNet

Government agrees to up Medicare card privacy and security controls
ZDNet
The federal government has agreed to the 14 recommendations made by the independent review of health providers' access to Medicare card numbers, touting an individual's privacy and card information security. One recommendation made by the review in ...

and more »
Google News

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More