logo Welcome, Guest. Please Login or Register.
2024-04-19 17:27:21 CoV Wiki
Learn more about the Church of Virus
Home Help Search Login Register
News: Read the first edition of the Ideohazard

  Church of Virus BBS
  General
  Science & Technology

  Crooks exploit those embarrassing files we all have
« previous next »
Pages: [1] Reply Notify of replies Send the topic Print 
   Author  Topic: Crooks exploit those embarrassing files we all have  (Read 984 times)
Fritz
Archon
*****

Gender: Male
Posts: 1746
Reputation: 8.85
Rate Fritz





View Profile WWW E-Mail
Crooks exploit those embarrassing files we all have
« on: 2012-04-05 16:10:54 »
Reply with quote

If only we could harness all this evil for good ... sigh.

Cheers

Fritz


Fake cop Trojan 'detects offensive materials' on PCs, demands money

Source: The Register
Author:  John Leyden
Date: 2012.04.05



Security firms are warning about a rash of police-themed ransomware attacks.

The Reveton Trojan warns victims that illegal content has supposedly been detected on infected machines, displaying a message supposedly from local police agencies demanding payment to unlock machines.

To unlock an infected machine, marks are invited to purchase a Paysafecard and pay €100 to obtain an unlock code. But in reality users need not hand over any dosh to regain control of their PCs. Control of infected machines can be established by following a few simple steps, as outlined in a blog post by F-Secure here. Similar recovery instructions from Microsoft can be found here.

Cybercrooks are obviously hoping that victims will be panicked into complying with their demands without seeking external help.

"Even when somebody is savvy enough to recognise the message is a fake, the malware's accusations of offensive materials having been discovered on the user's hard drive creates a chilling effect, which has likely prevented some folks from seeking outside help," the Finnish security firm notes.

Trend Micro reckons some of the people peddling the Reveton Trojan were also involved in the high-profile DNSChanger Trojan scam, the target of a successful Microsoft takedown operation last November.

"The same people peddling this Trojan are also heavily involved in other malware and are very invested in this business," writes David Sancho, a senior threat researcher at Trend Micro. "For instance, we have found that they were affiliates of the DNSChanger Trojan program called Nelicash that Rove Digital was sponsoring for a few years.

"The main persons behind Rove Digital were arrested on November 8 2011 after a two year investigation by the FBI, the NASA Office of the Inspector General and Estonian police in collaboration with Trend Micro and other industry partners. So we might have found an important clue who is behind the police Trojan."
Report to moderator   Logged

Where there is the necessary technical skill to move mountains, there is no need for the faith that moves mountains -anon-
Pages: [1] Reply Notify of replies Send the topic Print 
Jump to:


Powered by MySQL Powered by PHP Church of Virus BBS | Powered by YaBB SE
© 2001-2002, YaBB SE Dev Team. All Rights Reserved.

Please support the CoV.
Valid HTML 4.01! Valid CSS! RSS feed