CryptoWall 3.0 Ransomware Partners With FAREIT Spyware

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,379
Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that’s combined with spyware—a first for crypto-ransomware. This development just comes at the heels of the discovery thatransomware has included file infection to its routines.
CryptoWall 3.0

We first encountered CryptoWall as the payload of spammed messages last year. We noted that while other crypto-ransomware variants have a graphical user interface (GUI) for their payment purposes, CryptoWall relied on other means—opening a Tor site to directly ask for payment or opening the ransom note in Notepad, which contained the instructions to access a payment page via a Tor browser.

But a lot of things have changed since those first CryptoWall sightings. The earlier versions of CryptoWall pretended to be CryptoLocker, even mimicking its UI for its messages. Since then, we have seen CryptoWall use its own name and UI for its victims.

Also gone is the use of Tor for its command-and-control (C&C) servers. The latest version, dubbed CryptoWall 3.0, now uses hardcoded URLs. Admittedly, using Tor can be seen as an advantage for the anonymity offered. But the disadvantage is that system admins could easily block Tor network traffic or even the Tor application itself if there is no need for it.

The hardcoded URLs are heavily obfuscated so threat researchers wouldn’t extract them easily. Since URL blocking is reactive, there is a delay before the blocking can be implemented. During this “window,” the malware could have already communicated with the C&C server and acquired the RSA public key to be used for file encryption.

It should be noted that its C&C server is different from its payment page. The malware still uses Tor for its payment page so that transactions wouldn’t be hindered if authorities try to bring down their payment servers.

And perhaps as a “precautionary measure,” CryptoWall 3.0 deletes the system’s shadow copies to disable restoring files to their previous state, rendering victims with no other options for saving their files.

Read more: http://blog.trendmicro.com/trendlab...-3-0-ransomware-partners-with-fareit-spyware/
 
H

hjlbx

Best defense is not detection by signature.

Use a complete security solution that enables user to create Default-Deny system...

For example, Comodo Internet Security, ESET Smart Security, Kaspersky Internet Security.

Everytime I test undetected-by-signature cryptors, Default-Deny blocks.

NOTE: Anti-Excutables do not work unless user enables maximum settings (e.g. "Lock-Down" Mode).

FYI:

Comodo current version has been shown that default-deny can be by-passed using clever use of interpreters (command line, wscript.exe, java.exe, etc). Maybe Comodo fixed by now, but I am not sure.

AppGuard in Medium Mode, likewise, was bypassed using clever command line short-cut. Lock-Down mode protected system. This issue was reported and probably fixed by now, but I am not positive. Just use Lock Down Mode and it will protect system... which is what user should routinely use anyway despite AppGuard recommended Medium Mode.

With proper settings, Kaspersky Trusted Application Mode is just plain smack-down of unknown files. :D
 
Last edited by a moderator:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top