Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Trojan Holds Files for Ransom

    Written by

    Ryan Naraine
    Published March 20, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The explosion of criminal extortion activity on the Internet took another turn with the discovery of a new Trojan that encrypts files on an infected computer and then demands $300 in ransom for a decryption password.

      The Trojan, identified as Cryzip, uses cryptography to store the targets documents inside a password-protected Zip file and leaves step-by-step instructions on how to use the e-gold online currency system to pay the ransom.

      It is not yet clear how the Trojan is being distributed, but security researchers believe it was part of an under-the-radar e-mail spam run that successfully evaded anti-virus scanners.

      The discovery of this type of attack, known as ransomware, is not unique: There are at least two similar instances recorded.

      In one incident, in May 2005, researchers at Websense Security Labs found a similar Trojan in the wild. That threat, called PGPcoder, exploited a known security flaw in Microsofts Internet Explorer browser and used a custom encryption scheme to seize control of important files. In that case, a ransom was also demanded for file decryption.

      It all points to an increasing level of sophistication among online thieves, said Shane Coursen, senior technical consultant at Kaspersky Lab, an anti-virus vendor in Woburn, Mass.

      The LURHQ Threat Intelligence Group was able to crack the encryption code used in the Cryzip Trojan and determine how the files are encrypted, the identification of the e-gold payment mechanism that has been set up to collect the $300 ransom and the e-gold account numbers that are being used to collect the funds.

      Cryzip searches an infected hard drive for widely used file types, including Microsoft Word and Excel files, PDFs and JPEGs. Once commandeered, the files are Zipped, and the text is overwritten with the message “Erased by Zippo! GO OUT!!!”

      The Trojan then deletes all the files, leaving only the encrypted version with a text directory that includes very specific instructions on how to pay to retrieve the files.

      The owner of the infected machine is warned not to search for the program that encrypted the data, claiming it simply doesnt exist on the hard drive.

      The instructions, which are marked by misspellings and poor grammar, contain the following text: “Your computer catched our software while browsing illigal porn pages, all your documents, text files, databases was archived with long enought password. You can not guess the password for your archived files—password lenght is more then 10 symbols that makes all password recovery programs fail to bruteforce it (guess password by trying all possible combinations).”

      The Trojan author uses scores of e-gold accounts simultaneously to get around potential shutdowns, according to LURHQ, which published the complete list of e-gold accounts in an alert.

      “Infection reports are not widespread, so it is not believed this is a mass threat by any means,” read LURHQs online alert. However, the company said social engineering malware is typically more successful when delivered in low volumes because this allows it to avoid anti-virus detections.

      “More attention means the likely closing of the accounts used for the anonymous money transfer,” the research groups alert said.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.