New ransomware charges $300 (early bird special) to unlock your files

Status
Not open for further replies.

Prorootect

Level 69
Thread author
Verified
Nov 5, 2011
5,855
FQphBw5.jpg


PandaLabs has discovered a new strain of ransomware which it is calling Trj/Crypdef.A. The new variant works like other forms of ransomware in that it locks infected computers and encrypts a user’s files before demanding a ransom to get control back.
The ransom demand says "By purchasing a license from us, we are able to rescue your files 100% guaranteed for a very low early bird price of only $300". Don’t think $300 is a bargain? Well, in five days the demand goes up to $600, and after ten days it will cost you $1,000 to unlock your system and restore your files.

Read more: http://betanews.com/2014/08/19/new-ransomware-charges-300-early-bird-special-to-unlock-your-files/
 

Moose

Level 22
Jun 14, 2011
2,271
;)
Thank you! For the update on the latest ransomware which is appreicated! His there cure/fix for this new ransomware?

Kind regards,:(
 

cruelsister

Level 42
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,153
Moose- New variants of the cryptors are being churned out and sold in small batches on the darkWeb, so definition based detection is of little use. CyptoPrevent is good, but it's important to keep new variants at bay by making sure that the program is up to date. (The author must also stay on top of things- there was about a 7 day delay before protection against Critoni was provided).

Of course Comodo Firewall with Sandbox at Full V (or Untrusted) will provide protection.
 
  • Like
Reactions: NSG001

cruelsister

Level 42
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,153
Mostly no point in doing so. Most of the cryptors (like CrytoWall) will self-delete after encrypting your files, others will just sit where you downloaded them having no auto-start function (the main exception that comes to mind is the slightly older Zerolocker). So getting rid of the parent malware would either already be done for you by the malware itself, or be of no consequence as your files are already trashed.

As any of the production models of Cryptors will disable System Restore in various ways the only way to get your files back are either having an external backup or by paying the ransom.

Fun Fact- I sill haven't seen any ransomware that searches for the v2i, tib, or mrimg extensions in order to mess with them. So even if you have a secondary local drive with images from Symantec, Acronis, or Macrium on it you still may be fine.
 

Aura

Level 20
Verified
Jul 29, 2014
966
Hey guys, Aura here with another [WARNING] thread.

In the last year (or two years), a new kind of malware emerged from the Black Hat Forums, a combinaison of Ransomwares and Encryption malware, that comes together under the name of "Cryptowares". These malwares encrypt files with pre-defined extensions on a system (like .png, .mp3, .docx, etc.) and then totally lock down your computer, and ask you to pay for a ransom in order to decrypt these files. There's no ways to actually decrypt these files, except to pay the ransom, find a flaw in the malware, retrieve the private key used for the encrypted and decrypt the files yourself, or to restore the encrypted files from a back up or Windows Shadow Volume Copy service. These malwares became so popular, that many developpers started creating their own variants, making Cryptowares one of the most efficient malware-related way to make money. However, this Cryptowares method boum attracts a lot of malware developpers, experienced like inexperienced.

zerolocker.jpg


ZeroLocker, a new variant of the first Cryptoware, CryptoLocker has been released and is now being spread. ZeroLocker encrypts your files using the AES encryption pattern and once its done, it will display a warning note explaining you the situation and telling you that it can actually "help" you regain your files for a starter price of $300 in BTC, that will raise to $600 in 5 days and $1000 in 10 days (all in USD). A new feature in that Cryptoware is that it will actually encrypt EVERY files on your C: drive, even executable files except if they are in specific "white-listed" folders (the ones that contains the words Windows, WINDOWS, Program Files, ZeroLocker and Desktop) or if they are larger than 20MBs of size. Once a file has been successfully encrypted, ".encrypted" will be appended to its file name . After that, the following command will be ran :

Code:
C:\Windows\system32\cipher.exe /w:C:\

This command overwrites all the deleted data on your C: drive, which then prevents the user from using data recovery tools (such as EaseUS Data Recovery Wizard, Recuva, GetDataBackNTFS, etc.) in order to recover the data and restore the files. A folder called "ZeroLocker" will be created directly on the C: drive, and it will contain various files and the executable of the decryptor used to decrypt your files if you pay the ransom, called ZeroRescue.exe. This executable is called on Startup via the registry when you login to your computer.

However, here comes the biggest flaw that makes this Cryptoware the most dangerous one to this day. When ZeroLocker uploads the decryption key used to encrypt the files on a system to the Command and Control (C&C) server, it will returns a 404 status error code, which means that the request page on the server doesn't exist on the server. Usually, this upload should return a HTTP 200 status code, which means that the webpage was accessed successfully. In the end, this will result in the loss of the decryption key used for the encryption of the files on a system. Which means that even if you pay the ransom, your private key will not be returned by ZeroLocker in order to be used to decrypt your files. Which means that you'll basically pay the ransom and receive nothing in exchange. The only way to recover that key would be to manually explore the HTTP access logs, if the developper even keeps them or go through them. And this is if they aren't being deleted or rotated (overwritten) already. This is a big coding mistake (flaw) from the developper that released the product too quickly and didn't test it first. Without the private key, there's no way to decrypt your files as the encryption used is too strong to be broken.

404-error.jpg


However, there's one solution left for those who would get infected with ZeroLocker. This malware does not delete the Windows System Restore Points, which means that you can restore precedent version of your files using programs like Shadow Explorer or use the in-built "Previous Version" feature in Windows (requires you to have the Windows Shadow Volume Copy service enabled however).

To this day, this Cryptoware is the most dangerous there is, not only because it also encrypt your executable files and have the highest ransom of all the Cryptowares, but because of it's coding flaw, it offers you NO CHANCES AT ALL to recover your encrypted files via the ransom you pay and the only way to get that data back is to restore it from the Previous Versions or a back-up you took.

Researchers at Kaspersky's Lab analyzed the malware and state that this malware, is inspired by CryptoLocker, borrows a few of it's features but also add its own to make it more dangerous, not even counting the loss of the private key along the process.

I wrote this article by reading Grinler's post on BleepingComputer here : ZeroLocker - a new destructive encrypting ransomware
The credits for the pictures and information contained in this thread goes to him entirely, good job Grinler.

Another article on ZeroLocker has been published on ZDNet, here : New ZeroLocker crypto-ransomware offers discount for paying up quickly - or $1,000 in Bitcoin

Once again, I cannot stress enough of how backing up your data is important these days with these Cryptowares around, and even with the other malwares. Having an external HDD or Cloud Storage with scheduled back-up operations is a must-have now a day in order to have a rescue plan in case something bad really happens, and not only something caused by malwares.

CryptoPrevent, developped by FoolishIT can also be used to prevent ZeroLocker (and other Cryptowares and even other malwares) from being executed on your system. This tool have both a free and a paid version, however, the free should do a good job by itself.

Once again, be very, very careful of what you do on the web and your computer guys.

Stay safe and secure.
 

Aura

Level 20
Verified
Jul 29, 2014
966
Sorry, didn't notice your thread.
We could merge them as mine contains a lot of technical details about the Cryptoware and explains that it can't recover the data.
 
  • Like
Reactions: Prorootect

Prorootect

Level 69
Thread author
Verified
Nov 5, 2011
5,855
NO problem .. sure lot of details! - and your title is much better!

Thank you!
 

Aura

Level 20
Verified
Jul 29, 2014
966
NO problem .. sure lot of details! - and your title is much better!

Thank you!

All the credits goes to Grinler however for this information and the pictures.
I always rewrite articles I come across to make sure I understand the subject and also, it's more interesting to read then a copy/pasted article, haha. I also create content by doing so. I have over 20 [WARNING] threads like that on HF and LSx.
 
  • Like
Reactions: Prorootect
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top