‘Lock Screen’ Ransomware Makes a Comeback

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
Ransomware authors appear to be revising some old tactics in a bid to persuade their victims to part with their money, after a new strain of malware was found which locks the user’s screen but does not encrypt files.

Cyphort Labs malware researcher, Paul Kimayong, explained in a blog post that the new family of what it generically dubs “Ransom Locker” malware was discovered after his team followed an infection on a porn site.

This in turn redirected visitors to a RIG exploit kit landing page that served up the ransomware in the form of a malicious flash file and binary.

The final payload locks the victim’s computer and covers the screen with a message from Homeland Security with the usual warning that the user has viewed illegal content and must pay a fine or face criminal liability.

It also includes instructions on how to pay in Bitcoin or Vanilla – a prepaid card from Visa or MasterCard.

The researchers weren’t able to boot it in safe mode for further investigation so they analyzed the memory image offline instead.

Using VirusTotal they found four similar samples in the wild, dating back to the start of February 2016 and with very low detection rates.

Interestingly, Kimayong and his team discovered the malware authors have used VirusTotal themselves to test if their ransomware is detected by heuristics.

“The sample we got is version 0.02a-155. This clearly means it is in the early stage of development,” he wrote.

Full Article. ‘Lock Screen’ Ransomware Makes a Comeback
 
H

hjlbx

Believe it or not, screen-lock ransomware is some of the worst. Some of the "advanced" ones will even lock the user out of Safe Mode and use of the command line prompt in Safe Mode - much along the lines of the cryptor shown by @cruelsister in this video: Video Review - More Fun with Ransomware

Basically speaking...

Screen-lock ransomware holds your system hostage by denying access to the desktop, task manager, safe mode, command line console, etc - essentially locking a user out of their system. Cryptors hold your personal and vaulable files hostage by encrypting them - essentially preventing users from being able to open their most valued files.

The only vendor that has a countermeasure specifically for a screen-locker that I know of is Kaspersky. It involves use of a specific combination of keys to kill the lock screen. Light virtualization like Sandboxie, Shadow Defender, COMODO sandbox, Rollback RX and Drive Vaccine also prevents a permanent lock-out and is quite reliable. On the other hand, solutions like Webroot's monitoring and journaling was unable to reverse a screen-locker during my testing.
 
Last edited by a moderator:

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
There are so many security software that entitled to have Screen Locker protection but the problem here is that AV's design to prevent by detection and not on removal. A crucial disinfectant tool to make the issue handle its complex scenario beside on virtualization as prevention
 

Sandboxie Help

From Sandboxie
Verified
Developer
Feb 26, 2016
23
Why worry about heuristics? Virus total files? Etc? Just run Sandboxie. Even if you get something in the sandbox, it cannot escape to bother your host. You just delete the contents of your sandbox and move on...You can further config SBIE to deny / hide access to any file or folder on your host using blockedfilepath command in the ini setting. Truly zero day.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top