TechHive: Cryptolocker ransomware variant targets USB drives

TechHive
TechHive helps you find your tech sweet spot. We guide you to products you'll love and show you how to get the most out of them. 
Microsoft Excel 2010 Training Course

Beginner / Intermediate self-paced online course of Microsoft's spreadsheet application. Enroll for just $99.
From our sponsors
thumbnail Cryptolocker ransomware variant targets USB drives
Jan 4th 2014, 18:14, by John E Dunn, Techworld.com

Security researchers have discovered what looks like a copycat version of the Cryptolocker ransom Trojan that drops some of the malware's sophistication in favor of the single innovation of being able to spread via USB drives.

According to security firms Trend Micro and ESET, the recently discovered worm-like Crilock.A variant (which calls itself "Cryptolocker 2.0") poses as an updater for Adobe Photoshop and Microsoft Office on sites frequented by peer-to-peer file-sharers.

The command and control architecture is also new, ditching the domain generation algorithm (DGA) in favor of less sophisticated hardcoded URLs. Both of these odd developments have convinced Trend Micro that Crilock.A is the work of copycats rather than the original Cryptolocker gang.

Targeting file sharers is a strange choice because it while it increases the chance that the malware will be downloaded the potential list of victims is still far smaller than with previous "official" version. A similar point could be made about the abandonment of DGA for hard-coding, which is much easier to block; security firms simply have to reverse engineer the list and the malware becomes useless.

To read this article in full or to leave a comment, please click here

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Previous
Next Post »