Ransomware scammers push panic button with bogus claims

No sign that newest cyber extortion racket wipes Windows PCs' hard drives, says Symantec

Cyber extortionists shilling "ransomware" have upped the ante by pushing users' panic buttons with claims that their malware will wipe hard drives, a security firm said Monday.

The claim is bogus, said Symantec, and is simply a ploy by scammers preying on people's fears.

"This is an attempt to extort money from computer users by taking advantage of human weakness when under panic and pressure," wrote Symantec researcher Jeet Morparia in a Dec. 24 blog post.

Ransomware is a long-standing label for malware that, once on a personal computer, cripples the machine or encrypts its files, then displays a ransom note that demands payment to restore control to the owner. The technique, flatly called "an extortion racket" by Symantec last month, has been in use for at least six years. Until relatively recently, it was rare and ineffective and seen mostly in Eastern Europe.

The new ransomware variant, which Symantec identified as "Trojan.Ransomlock.G" but is called "Reveton" by other antivirus vendors, claims that any move to circumvent the lockdown will trigger disaster.

"An attempt to unlock the computer by yourself will lead to the full formatting of the operating system. All the files, videos, photos, documents on your computer will be deleted," the on-screen message reads.

Not true, said Morparia, who added that Symantec's analysis found no disk wiping capability in the malware's code. More importantly, Symantec was able to remove Ransomlock.G and unlock the machine without any formatting taking place or files deleted.

The new version also featured other changes, Morparia said, including a $100 price hike, from $200 to $300, to "unlock" the PC, and a fake deadline of 48 hours shown by an on-screen countdown timer.

Symantec credited a blogger nicknamed "Kafeine" for reporting the purported wiping skills of the ransomware. In turn, Kafeine tipped a hat to another security company, Trend Micro, for finding the variant on Dec. 10.

Ransomlock poses as a message from law enforcement, and adapts to its victims' locales: For example, U.S. users see a message supposedly from the Department of Justice's FBI, while German users see one allegedly from the Bundesamt fr Polizei, Germany's federal police.

The messages claim that the user has violated one or more laws. Those posing as from the FBI, for instance, listed child pornography, copyright and software licensing laws, and alleged that the victim has been monitored -- including via the computer's built-in webcam -- viewing child pornography.

In November, Symantec released a report describing the rapid expansion of ransomware into Western markets from its Eastern European origins, and the millions criminals have reaped from their scams.

Morparia urged victims not to give in to the extortionists -- "DO NOT PAY THE RANSOM," he wrote, figuratively shouting with uppercase characters -- and instead told them to remove the malware. Symantec provides a free tool, Norton Power Eraser, that seeks out and destroys ransomware and other forms of "scareware," like fake antivirus software.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is gkeizer@computerworld.com.

See more by Gregg Keizer on Computerworld.com.

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Copyright © 2012 IDG Communications, Inc.

It’s time to break the ChatGPT habit
Shop Tech Products at Amazon