{"id":3582,"date":"2014-06-10T10:38:31","date_gmt":"2014-06-10T14:38:31","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=3582"},"modified":"2020-02-26T20:28:05","modified_gmt":"2020-02-26T14:58:05","slug":"ransomware-outbreak","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-outbreak\/3582\/","title":{"rendered":"Cyber-extorters Encrypt Both PCs and Smartphones"},"content":{"rendered":"<p>Ransomware became one of the most convenient rackets for cybercriminals. <a href=\"https:\/\/threatpost.com\/fbi-european-authorities-go-after-gameover-zeus-botnet\" target=\"_blank\" rel=\"noopener nofollow\">On reading recent news on the GameOver Zues botnet<\/a> we found out that its owners were also actively distributing the <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">CryptoLockerransomware<\/a>, which encrypts the victim\u2019s files and asks for ransom in a case when <a href=\"https:\/\/www.kaspersky.com\/blog\/the-big-four-banking-trojans\/\" target=\"_blank\" rel=\"noopener nofollow\">Zeus banking trojan<\/a> did not have any success while on rampage in your PC. A similar scheme is now gaining traction on smartphones: iOS-based devices <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware_targets_ios_osx\/\" target=\"_blank\" rel=\"noopener nofollow\">are blocked with the help of the Apple\u2019s Find My iPhone service<\/a>, while for Android smartphones the culprits have coded a mobile version of Cryptolocker, <a href=\"http:\/\/www.securelist.com\/en\/blog\/8225\/The_first_mobile_encryptor_Trojan\" target=\"_blank\" rel=\"noopener nofollow\">Pletor.a<\/a>. Unfortunately, the news resources tend to serve such information lavishly seasoned with panic, and you are very likely to have seen headlines like \u2018Only Two Weeks to Protect Your Computers from a Dreadful Threat\u2019. You need not panic; just know your enemy and follow our protection action plan.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2015\/05\/05092715\/ransomware-1024x768.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5047\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2015\/05\/05092715\/ransomware-1024x768.png\" alt=\"ransomware\" width=\"640\" height=\"480\"><\/a><\/p>\n<h3><\/h3>\n<h3>Why Cryptolocker and its likes are dangerous<\/h3>\n<p>Unlike previous examples of \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-blockers-a-new-approach-to-fighting-them\/\" target=\"_blank\" rel=\"noopener nofollow\">blockers<\/a>\u201c, which used to just block the PC screen to disturb your PC experience, cryptolockers, as is read in the name, encrypt the user\u2019s files.<\/p>\n<div class=\"pullquote\">Even having managed to delete the malware, you cannot continue working with your files.<\/div>\n<p>It means that, even having managed to delete the malware, you cannot continue working with your files. A number of such lockers, owing to mistakes and imperfections in their code, are quite likely to be deciphered by third-party anti-virus utilities. With regard to better-crafted samples of cryptolockers, they use strong encryption and do not store the key on the affected PC, making user-initiated deciphering impossible, keeping this opportunity open only for the cybecriminals (who, obviously, demand $50-2000 for this \u201cservice\u201d). This approach is now used on Android devices: Back in May, we discovered the <a href=\"http:\/\/www.securelist.com\/en\/blog\/8225\/The_first_mobile_encryptor_Trojan\" target=\"_blank\" rel=\"noopener nofollow\">Pletor.a ransomware<\/a>, which is able to encrypt files stored on an SD card and place a threatening message on a display, asking for a ransom. Current Pletor versions do have the aforementioned flaw, so third parties (read: antivirus companies, e.g. us) are able to help the victim with file deciphering, but as of today, there are more than 30 modifications of this ransomware, and the version which does not allow for third-party deciphering, might be just around the corner.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>New \u201cmilking\u201d scheme for cybercriminals: First, steal your banking credentials, then encrypt your files and demand a ransom.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F18aY&amp;text=New+%26%238220%3Bmilking%26%238221%3B+scheme+for+cybercriminals%3A+First%2C+steal+your+banking+credentials%2C+then+encrypt+your+files+and+demand+a+ransom.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Also, last week in the US we have discovered a new version of mobile banking Trojan <a href=\"http:\/\/www.securelist.com\/en\/blog\/8138\/The_Android_Trojan_Svpeng_now_capable_of_mobile_phishing\" target=\"_blank\" rel=\"noopener nofollow\">Svpeng<\/a>, which is evidently walking in GameOver Zeus\u2019s shoes. The current version is able to efficiently block the device, demanding a ransom. Additionally, the malware\u2019s code shows developers\u2019 intent to steal financial data from the smartphone and contains a link to a not yet implemented Cryptor method, which is likely to offer the file blocking capability to the cybercriminals. Curiously, not only do mobile Trojans encrypt the files, but blackmail the user with mailing the compromising text messages or photos along the victim\u2019s contact list. That means the bleeders now have one more trick in their sleeve.<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/06\/05084102\/mobile-cryptolocker-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5046 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/06\/05084102\/mobile-cryptolocker-1.png\" alt=\"mobile-cryptolocker-1\" width=\"540\" height=\"960\"><\/a><br>\n<\/strong><\/p>\n<h3><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/06\/05093810\/mobile-cryptolocker-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3595\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/06\/05093810\/mobile-cryptolocker-2.png\" alt=\"mobile-cryptolocker-2\" width=\"540\" height=\"960\"><\/a><\/h3>\n<h3><\/h3>\n<h3>Protecting your PC from Cryptolocker, PrisonLocker, Cryptowall and their likes<\/h3>\n<ul>\n<li>Check your PC for Zeus-type malware. Use <a href=\"http:\/\/support.kaspersky.com\/viruses\/disinfection\/5350#block1\" target=\"_blank\" rel=\"noopener\">the free Kaspersky Lab utility<\/a> which is able to scan the PC and delete the malware.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">strong Internet security solution<\/a>. It will prevent compromising in the future.<\/li>\n<li>Create <a href=\"https:\/\/www.kaspersky.com\/blog\/call-for-backup\/\" target=\"_blank\" rel=\"noopener nofollow\">an online backup copy of your data<\/a>. It will be needed in case your PC is affected by Cryptolocker. Instead of paying ransom for your encrypted data, you just need to restore it. The backup will also save you in case of fire, hard drive failure and other unfortunate circumstances. It is vital to perform a regular backup on your PC. For the online backup plan, instant synchronization is possible, for locally stored backup copy we recommend daily synchronization. To ensure better protection from Cryptolocker, all external storage devices must be disconnected after the backup has been performed.\u00a0<blockquote class=\"twitter-pullquote\"><p>Well-maintained backup solution is an important part of your protection from Cryptolocker ransomware both on PC and Android.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F18aY&amp;text=Well-maintained+backup+solution+is+an+important+part+of+your+protection+from+Cryptolocker+ransomware+both+on+PC+and+Android.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote><\/li>\n<\/ul>\n<h3>Protecting a smartphone from the Pletor.a ransomware and Svpeng ransomware<\/h3>\n<ul>\n<li>Install <a href=\"http:\/\/kas.pr\/kmsf\" target=\"_blank\" rel=\"noopener\">a robust antivirus app<\/a> from Google Play or other trusted app store like Yandex.Store;<\/li>\n<li>In security settings, disable the third-party app installation support;<\/li>\n<li>Do not download apps from forums, third-party websites, etc. Use only trusted sources.<\/li>\n<li>On installation, keep an eye on access rights the app is asking for. Traditionally, rights to send text messages or making calls are considered suspicious, yet the right which must immediately attract your attention is the right to modify the content of the SD card. Unfortunately, it is a very popular right used by many games, dictionaries and other legitimate software. So the decision must not be taken based only on the application access rights. If you disabled automatic scanning for the newly installed apps, run the antivirus on each new app installation.<\/li>\n<li>Use Google Drive, Dropbox and other cloud storage and backup solution to backup your photos and other documents.<\/li>\n<\/ul>\n<h3>Beware of fake \u2018cures\u2019<\/h3>\n<p>Cybercriminals went as far as using the news on Cryptolocker and GameOver Zeus to their advantage. <a href=\"http:\/\/www.express.co.uk\/news\/science-technology\/480707\/Hackers-exploit-CryptoLocker-and-Gameover-Zeus-virus-fears\" target=\"_blank\" rel=\"noopener nofollow\">The spam<\/a> offering utilities for malware deletion and post-Cryptolocker file deciphering is already distributed online. Those who download the utility, being lured into it by its seeming ease of use and freeware nature, are doomed to have even more malware on their PCs. So we recommend using only trusted applications from the trusted suppliers to cure your systems from Cryptolocker.<\/p>\n<h3>Protect your smartphone now<\/h3>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/06\/05084101\/Untitled.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5048\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/06\/05084101\/Untitled.png\" alt=\"Untitled\" width=\"150\" height=\"170\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer ransomware is getting more sophisitcated, while mobile cryptolockers are emerging both in Europe and the U.S.<\/p>\n","protected":false},"author":32,"featured_media":3583,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2196],"tags":[105,563,624,549,676,443,675,1898,674],"class_list":{"0":"post-3582","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-backup","11":"tag-cryptolocker","12":"tag-news-2","13":"tag-pletor","14":"tag-ransomware","15":"tag-svpeng","16":"tag-tips","17":"tag-zeus"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-outbreak\/3582\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-outbreak\/3477\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-outbreak\/3910\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-outbreak\/4119\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-outbreak\/4277\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-outbreak\/5045\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-outbreak\/3876\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-outbreak\/4277\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-outbreak\/5045\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-outbreak\/5045\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=3582"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3582\/revisions"}],"predecessor-version":[{"id":19080,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3582\/revisions\/19080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/3583"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=3582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=3582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=3582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}