Ransomware scammers push panic button with bogus claims
No sign that newest cyber extortion racket wipes Windows PCs' hard drives, says Symantec
Computerworld - Cyber extortionists shilling "ransomware" have upped the ante by pushing users' panic buttons with claims that their malware will wipe hard drives, a security firm said Monday.
The claim is bogus, said Symantec, and is simply a ploy by scammers preying on people's fears.
"This is an attempt to extort money from computer users by taking advantage of human weakness when under panic and pressure," wrote Symantec researcher Jeet Morparia in a Dec. 24 blog post.
Ransomware is a long-standing label for malware that, once on a personal computer, cripples the machine or encrypts its files, then displays a ransom note that demands payment to restore control to the owner. The technique, flatly called "an extortion racket" by Symantec last month, has been in use for at least six years. Until relatively recently, it was rare and ineffective and seen mostly in Eastern Europe.
The new ransomware variant, which Symantec identified as "Trojan.Ransomlock.G" but is called "Reveton" by other antivirus vendors, claims that any move to circumvent the lockdown will trigger disaster.
"An attempt to unlock the computer by yourself will lead to the full formatting of the operating system. All the files, videos, photos, documents on your computer will be deleted," the on-screen message reads.
Not true, said Morparia, who added that Symantec's analysis found no disk wiping capability in the malware's code. More importantly, Symantec was able to remove Ransomlock.G and unlock the machine without any formatting taking place or files deleted.
The new version also featured other changes, Morparia said, including a $100 price hike, from $200 to $300, to "unlock" the PC, and a fake deadline of 48 hours shown by an on-screen countdown timer.
Symantec credited a blogger nicknamed "Kafeine" for reporting the purported wiping skills of the ransomware. In turn, Kafeine tipped a hat to another security company, Trend Micro, for finding the variant on Dec. 10.
Ransomlock poses as a message from law enforcement, and adapts to its victims' locales: For example, U.S. users see a message supposedly from the Department of Justice's FBI, while German users see one allegedly from the Bundesamt für Polizei, Germany's federal police.
The messages claim that the user has violated one or more laws. Those posing as from the FBI, for instance, listed child pornography, copyright and software licensing laws, and alleged that the victim has been monitored -- including via the computer's built-in webcam -- viewing child pornography.
In November, Symantec released a report describing the rapid expansion of ransomware into Western markets from its Eastern European origins, and the millions criminals have reaped from their scams.
Morparia urged victims not to give in to the extortionists -- "DO NOT PAY THE RANSOM," he wrote, figuratively shouting with uppercase characters -- and instead told them to remove the malware. Symantec provides a free tool, Norton Power Eraser, that seeks out and destroys ransomware and other forms of "scareware," like fake antivirus software.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts