Jump to content

Ransomware Is Distributed Via Tor - General Hangout & Discussions - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

Ransomware Is Distributed Via Tor


SaP
 Share

Recommended Posts

Security experts detected a new kind of Crypto ransomware that uses Tor anonymizing network to hide its antics. The so-called “Critroni” has been flogged on underground forums for a few weeks now and is currently being used by the Angler exploit kit. The most interesting thing is that it is the first crypto ransomware that uses the Tor network for command and control.

Screen_Hunter_03_Jul.jpg

Security experts confirm that the news is bad. The current situation is the following: the ransomware landscape is ruled by CryptoLocker, and this part of code is really hard to defeat. The malware encrypts all of the files on the affected PC and demands a settlement from the victim to get the private key to decrypt the information.

Police in the US and Europe shut down the GameOver Zeus malware operation, which proved to be one of the key mechanisms the hackers needed to push CryptoLocker. After that, security researchers ran into adverts for the Critroni ransomware, which is also known as CTB-Locker, first used in the Russian Federation.

The code is currently sold for $3,000 and security researchers confirm that it is now being used by a number of attackers, with some of them using the Angler exploit kit to drop a spambot on users’ computers.

Once on your computer, Critroni encrypts various files, including pictures and documents, and then displays a dialogue box that informs you of the ransomware and demands a payment in exchange to the key to decrypt the files. Normally, victims are given 3 days to pay up the ransom in Bitcoins. The demanded amount is something about $300, for victims in the United States, Canada and Europe.

This particular breed has the unique and interesting feature: it uses the C2 function hidden in the Tor network for its command-and-control infrastructure. According to Fedor Sinitsyn, senior malware analyst at Kaspersky Lab, they found out that the executable code for establishing Tor connection is embedded in the ransomware’s body. The experts had to admit that embedding Tor functions in the malware’s body is not easy from the programming point of view. However, this feature helps Critroni or CTB-Locker avoid detection.

It should be noted that Critroni has been spotted in English and Russian, so the suggestions are that countries using the languages will be first to suffer.

http://extratorrent.cc/article/3809/ransomware+is+distributed+via+tor.html

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Customer Reviews

  • Similar Topics

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.