Encrypting Trojan targets users, demands $5,000
Posted on 14.03.2013
Russian anti-virus company Doctor Web is warning users of an active ransomware campaign executed through brute force attack via the RDP protocol on target machines.

Once connected to the attacked PC, cyber-criminals launch a variant of the ArchiveLock Trojan, which uses the archiver WinRAR to encrypt files.

"Trojan.ArchiveLock.20 creates a list of files to be encrypted, empties the Recycle Bin, and deletes all backups stored on the computer. The Trojan uses the console version of WinRAR to place files on the compiled list into password-protected, self-extracting archives and employs a special utility to delete original files, after which they simply can't be restored," Dr. Web researchers explain.

Then the Trojan presents the victim with a long message, explaining the situation and asking $5,000 for the password that would decrypt the archives (click on the screenshot to enlarge it):



"A significant number of systems have now been compromised by the Trojan in Spain and France: over the past 48 hours, Doctor Web's technical support has gotten dozens of requests from people whose files have been encrypted by Trojan.ArchiveLock.20, and such requests are still being received," they say.

They also advised users not to believe what the message says, not to delete any files from the hard disk or try to reinstall the operating system, but to contact the company by submitting a ticket in the Request for Curing category, and promising free-of-charge help in decrypting the files.









Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //