New ransomware holds Windows files hostage, demands $50
'Sobering' turn by crooks 'doesn't bode well,' says researcher
Computerworld - Cybercrooks have hit on a new twist to their aggressive marketing of fake security software and are duping users into downloading a file utility that holds users' data for ransom, security researchers warned today.
While so-called scareware has plagued computer users for months, those campaigns have relied on phony antivirus products that pretend to trap malware but actually only exist to pester people into ponying up as much as $50 to stop the bogus warnings.
The new scam takes a different tack: It uses a Trojan horse that's seeded by tricking users into running a file that poses as something legitimate like a software update. Once on the victim's PC, the malware swings into action, encrypting a wide variety of document types -- ranging from Microsoft Word .doc files to Adobe Reader PDFs -- anytime one is opened. It also scrambles the files in Windows' "My Documents" folder.
When a user tries to open one of the encrypted files, an alert pops up saying that a utility called FileFix Pro 2009 will unscramble the data. The message poses as an semiofficial notice from the operating system. "Windows detected that some of your MS Office and media files are corrupted. Click here to download and install recommended file repair application," the message reads.
Clicking on the alert downloads and installs FileFix Pro, but the utility is anything but legit. It will decrypt only one of the corrupted files for free, then demands the user purchase the software. Price? $50.
"This does look like a new tactic," said David Perry, the global director of education at antivirus vendor Trend Micro Inc. "But all online fraud is just minor variations of classic con games. This is just the 'Bank Examiner' played out on the Internet."
That classic con, said Perry, typically involves a swindler posing as an official, a bank examiner or an FBI agent who asks for help in an investigation. The swindler convinces the mark to withdraw money from the bank -- it's needed to catch the nonexistent crook in the act -- and promises to return the funds at the end of the case. Of course, the money vanishes, along with the grifter.
On the Web, data-hostage scams like this are called "ransomware" for obvious reasons. This isn't the first time the tactic has been used, but it is remarkably polished, said Perry. "We've not seen ransomware with this level of sophistication," he said.
Users who have fallen for the FileFix Pro 2009 con do not have to fork over cash to restore their files, according to other researchers, who have figured out how to decrypt the data. The Bleeping Computer site, for instance, has a free program called "Anti FileFix" available for download that unscrambles files corrupted by the Trojan horse. And security company FireEye Inc. has created a free online decrypter that also returns files to their original condition.
Alex Lanstein, a malware researcher at FireEye who blogged about FileFix Pro 2009 last week, called the turn from scareware to ransomware "sobering."
"Although we broke the encryption, it's a sobering realization of the state of malware that it is now actively extorting users by holding their data ransom," Lanstein said. "Despite this version of FileFix being trivial to crack, it does not bode well for the future of Internet malware."
If ransomware follows a similar path as scareware, criminals will be hustling to mimic FileFix Pro. According to some estimates, crooks make as much as $5 million a year pushing fake antivirus software.
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!