CryptoDefense rakes in $34K in bitcoin ransom

Share this article:

Cyber criminals have raked in more than $34,000 in the month since CryptoDefense Trojan, a variant of CryptoLocker, first appeared in February 2014 even though a poor implementation of cryptography has left “hostages” with an escape route, according to Symantec.

Symantec has blocked more than 11,000 unique CryptoDefense infections, which are spammed out via email to Windows computers. The ransomware holds victim files hostage by employing public-key cryptography using strong RSA encryption and prevents restoration until a $500 ransom payment is made in bitcoins through a unique Tor payment web page address. If the payment is not made within four days, the ransom doubles.

However, victims need not cough up a penny. They can circumvent the attack and restore files because poor cryptographic implementation by the malware authors leaves the decryption key they're holding for ransom on the infected computers.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ShellShock vulnerability exploited in SMTP servers

Researchers at Trend Micro found that attackers were targeting Simple Mail Transfer Protocol (SMTP) servers to execute malicious code and an IRC bot.

Hackers grab email addresses of CurrentC pilot participants

Hackers grab email addresses of CurrentC pilot participants

Although the hack didn't breach the mobile payment app itself, consumer confidence may be shaken.

Operators disable firewall features to increase network performance, survey finds

Operators disable firewall features to increase network performance, ...

McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.