The next generation of CryptoWall malware emerges

Status
Not open for further replies.

Petrovic

Level 64
Thread author
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
After a short-lived hiatus, the creators of CryptoWall have re-emerged with the next generation of the devious malware, coined "CryptoWall 3.0". Just as security experts thought they had a handle on the original threat, the emergence of version 3.0 sparks debate as to what signals to look out for and how to protect against the rise of ransomware variants.

So what's new? Since making its debut last fall and wreaking havoc on thousands of businesses and individuals globally, CryptoWall is the biggest name in ransomware threats. Its predecessor, Cryptolocker, started the snowball effect in 2013 as one of the first ransomware strains to enter the marketplace.

The concept is simple: victims are infected with the CryptoWall malware by opening a malicious email attachment. Once on the system, CryptoWall encrypts the victims’ files and demands a $500 ransom for the files to be saved. Payment must be made within a seven-day period or the ransom will double.

Enter a new wave of the threat -- CryptoWall 3.0. First introduced mid-January 2015, this is a next-gen ransomware variant that is creating more opportunity for hackers as increased privileges and wider infections are more likely, given that the proliferation now uses exploit kits to help the ransomware once it’s on the machine.

Also, instead of relying on the TOR privacy network like previous versions of CryptoWall, an even more shadowy network known as the Invisible Internet Project (I2P) is introduced, which has security experts simultaneously trying to learn more about the threat while educating the public on prevention measures.

As an anonymity network, I2P is the channel through which communication is carried out between victims and controllers, keeping out law enforcement officials. Researchers believe a hybrid method is leveraged by cyber criminals so that if either TOR or the I2P networks are down, the malware is still fully functional and able to uphold communication between its command and control centers.

Additionally, the following new capabilities are included in CryptoWall 3.0:

  • An ability to geolocate an affected system and display language-appropriate messages
  • An extended ransom collection period
  • Built-in virtual machine detection to help make sure the malware only hits legitimate systems, not testing environments
A Few Red Flags

While CryptoWall 3.0 is certainly shaking up the security landscape, there are a few red flags to look out for that remain consistent with the original CryptoWall threat, including:

  • Files named HELP_DECRYPT in .txt, .html, .url, and .png formats
  • The use of RSA2048 for the encryption algorithm
  • Bitcoin for the accepted payment method
  • Distribution methods that include drive-by-download and email dissemination
What to Expect Next

While security experts are keeping pace with emerging threats, one thing is for sure -- cyber hackers aren’t slowing down anytime soon. Security threats are on the rise, and it’s become critical that businesses and individuals alike become educated on prevention measures to best protect their assets from falling victim to rising security threats.
 

TwinHeadedEagle

Level 41
Verified
Mar 8, 2013
22,627
I fight malware on a daily basic, and from my point of view, I think that their tactics are not so good. What is the point of infection someone's system and encrypting the files when you actually leave PC usable. Poweliks infection was pretty effective, it makes your PC practically unusable by creating multiple processes that are using all processor power. By doing this people are desperate, PC is practically unusable.

By saying this, I think that they need to make PC more unusable like some Department of Justice viruses that disable Safe Mode and do not let you boot asking you to pay for unlock instead.

When you're dealing with Cryptowall, there's always a possibility to remove infection and to restore files if you have backups. But when you lock their PC down, they are desperate :)

Of course this applies to people that doesn't have very important files on their PC so they do not need to pay for the ransom.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top