Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Ransom Trojan Uses Cryptography for Malicious Purpose > NetSparsh - Viral Content you Love & Share

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.

We've been warned lots of times about stealing data -- identity theft, phishing scams and pharming; we have at least heard of denial-of-service attacks and "zombie" computers, and now one more type of online attack has emerged: holding data for ransom. Extortionists remotely encrypt somebody's files and then demand money for the key to decode the information.

Experts say it is not yet a tendency; websites that used to infect users with the Trojan, have been put down. Besides, this program, Trojan.Pgpcoder, exploits a vulnerability in Microsoft Internet Explorer, which users should have patched as long ago as last July. However, there is no guarantee that such attacks won't appear in future, and all PCs will be patched at that time.

Websense, the San Diego-based Web security company, was the first to report such a case two weeks ago, when its customer fell victim to the attack.

Researchers at Symantec also have seen the malicious program used in the ransom attack. Oliver Friedrichs, a senior manager at Symantec Security Response said that attackers could use a website, email, or other means to distribute the Trojan.Pgpcoder and launch a widespread extortion campaign.

When the user visits a malicious website, his unpatched PC gets infected with a Trojan Horse (downloader-aag). This Trojan Horse downloader connects to another website, downloads the encoding application, and runs it.

The malicious encoding program searches for 15 common file types, including images and Microsoft Office files on the computer and encrypts them, and deletes the original files.

Then it creates a file with a ransom note called “Attention!!!”, where demands $200 for a tool needed to decrypt the files.

However, there is a weak spot in the attackers' scheme. It is possible to trace the money and to catch the extortionists when they try to collect the ransom. Maybe, it will prevent this kind of cybercrime from spreading.

Time will show whether we see this Trojan attack again or something similar appears and there will be a real need for a name for such type of Trojans -- how do you like "ransomware"? I have already seen this word used, but let's hope for the best.

Anyway, it is always wise of users to keep anti-virus and security software up-to-date and back up data. Just to be on the safe side.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NBCNews.com

Sandy Hook shooting anniversary: How schools have changed ...
NBCNews.com
These are among the physical reinforcements that have become more common in schools across the country in the five years since the tragedy at Sandy Hook Elementary, as more and more schools try to address security concerns. Experts say the Dec. 14 ...
The legacy of Newtown: Lockdowns, active-shooter training and school securityWashington Post
Sandy Hook's legacy: More security in elementary schoolsThe Denver Post
Sheryl Crow releases new song, 'The Dreaming Kind,' for 5th anniversary of Sandy Hook school shootingABC News
YouTube -PEOPLE.com
all 150 news articles »

TechCrunch

Upstream Security reels in $9M Series A to protect connected cars
TechCrunch
Upstream Security, a new startup founded by two cyber security industry veterans, announced a $9 million Series A today to help protect connected vehicles and eventually autonomous cars. Today, that probably means a car using a service like OnStar to ...

and more »

Fox News

Sessions: terror attacks show immigration a security issue
Fox News
Homeland Security Secretary Kirstjen Nielsen, the former deputy White House chief of staff confirmed last week by the Senate, said "while we are not aware of any specific credible threats today we are taking additional security precautions and ...
Recent NYC terror attacks show immigration is a security issue, Jeff Sessions saysChicago Tribune

all 30 news articles »

CSO Online

5 top machine learning use cases for security | CSO Online
CSO Online
Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

and more »

Knicks.com

Safety and Security Notice
Knicks.com
The Madison Square Garden Company places the safety and security of our guests above all else. In light of the incident in New York yesterday morning, we have increased security measures across all of our venues and are working closely with local law ...

and more »

Fox News

Trump to release national security strategy next week
Fox News
WASHINGTON – President Donald Trump is set to unveil his first National Security Strategy next Monday. National security adviser H.R. McMaster said the strategy will incorporate four core national interests: the protection of American people; advancing ...
Trump to Unveil Key National Security StrategyU.S. News & World Report
Trump's New National Security Strategy Not Likely to Alter the Pattern of 'Promiscuous Intervention'Reason
Trump will announce new US security strategy on Monday: adviserReuters

all 11 news articles »

Medscape

Cyber Security Is a Serious Problem for Physicians: Survey
Medscape
More than four in five US physicians (83%) have experienced some form of a cyber attack, according to new research released today by the American Medical Association (AMA) and Accenture. Fifty-five percent of the 1300 physicians who responded to the ...

and more »

Baltimore Sun

US energy approach will affect national security
Baltimore Sun
Clean energy also matters from a national security point of view, in part because the strength of our national defense is tied to the strength of our economy. Developing homegrown, renewable sources of energy also boosts energy independence. Loosening ...


War on the Rocks

What Would an Honest National Security Strategy Say?
War on the Rocks
Staffers on the U.S. National Security Council are currently putting the finishing touches to the Trump administration's congressionally mandated National Security Strategy. The strategy is supposed to describe America's interests, identify the threats ...


UN News Centre

Security tensions may have deepened rights violations in DPRK, Security Council told
UN News Centre
Indeed, security tensions seem to have deepened the extremely serious human rights violations endured by the DPRK's 25 million people,” UN High Commissioner for Human Rights Zeid Ra'ad Al Hussein told the Security Council via video link from Paris. He ...

and more »
Google News

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More