- YouTube removes ‘coordinated’ channels spreading Hong Kong misinformation 6 Years Ago
- Christina Hendricks reveals she was the hand model for ‘American Beauty’ 6 Years Ago
- Why can’t independent feminist websites stay afloat? Today 8:17 AM
- Far-right troll Jacob Wohl scammed a Trump fan out of $25,000 Today 7:54 AM
- How to stream Browns vs. Buccaneers in key preseason action Today 7:02 AM
- Harness the power of sun: The best solar-powered phone charges Today 6:00 AM
- Majority of threats made since El Paso and Dayton shootings have been made online Thursday 8:00 PM
- Miley Cyrus tweets about cheating allegations and penis cake drama Thursday 6:32 PM
- ‘The Dark Crystal: Age of Resistance’ dazzles with a timely tale Thursday 6:00 PM
- The DOJ emailed a white nationalist blog post to immigration judges Thursday 5:31 PM
- The Amazon rainforest is on fire–and people are using memes to cope Thursday 4:11 PM
- Microsoft contractors listened in on Xbox users Thursday 2:15 PM
- Anti-vaxxer assaults pro-vaccine lawmaker on Facebook Live (updated) Thursday 2:15 PM
- Oreos licked by singer Lewis Capaldi are being auctioned off on eBay Thursday 1:54 PM
- Zach Braff predicted Sean Spicer would be on ‘Dancing With the Stars’ 2 years ago Thursday 1:38 PM
Worst virus ever locks your files, demands Bitcoin ransom
Other ransom viruses are just a bluff. CryptoLocker is for real.
How much would you pay to avoid losing the wedding pictures stored on your computer? What about the financial documents for your small business? Or the first two chapters of the great American novel that you’re totally going to finish at some point?
Over the last few months, computer users around the world have been on the receiving end of a particularly troubling threat—pay $300 to a computer hacker who has installed an insidious virus on their systems or lose access to their files forever. The kicker: a ticking clock indicates they only have 100 hours in which to send the money.
The virus is called CryptoLocker. And while the blackmail attempts may initially seem like idle threats, failing to pay could result in the files on hard drive getting cryptographically locked, making them effectively unusable.
After being downloaded, CryptoLocker installs itself in a user’s “Documents and Settings” folder. It then scans the hard drive for a whole host of different file types—from family photographs to Microsoft Word and Adobe Photoshop documents—and encrypts them.
Once the encryption is complete, CryptoLocker launches a pop-up window informing the user they have exactly 100 hours to pay the ransom. If the target pays up, the program provides the key. However, if the deadline lapses without payment, the key is supposedly destroyed.
SophosLabs’ Naked Security blog warns that with the key destroyed, there’s not much someone can do to recover their files. The firm said it had received a large number of “scrambled documents” from victims of the virus, clearly hoping the company could do something to restore them.
“But as far as we can see,” the company wrote, “there’s no backdoor or shortcut…[what’s been] scrambled, only the private key can unscramble.”
Catching the criminals behind the scam might be the only way to save encrypted files, assuming they’ve kept copies of the keys
The virus breaches computers via phony emails that look like they’re well-respected organizations, such as the Better Business Bureau or package tracking notifications from FedEx or UPS.
Victim payments are handled either through Green Dot MoneyPak reloadable debit cards or the anonymous digital currency Bitcoin.
Interestingly, the whole scheme seems to mimic the plot of sci-fi author Neal Stephenson’s novel Reamde, in which the virus encrypts files on computers to extort gold used in a popular massively multiplayer online role-playing game.
CryptoLocker is the most extreme example of “ransomware.” Typically, malware of this genre is either entirely fake or simply freezes the infected computer—something computer experts are generally able to fix. However, CryptoLocker is the first widely-reported instance where a ransomware program will actually go as far as permanently encrypting files on a host’s computer.
Aaron Sankin is a former Senior Staff Writer at the Daily Dot who covered the intersection of politics, technology, online privacy, Twitter bots, and the role of dank memes in popular culture. He lives in Seattle, Washington. He joined the Center for Investigative Reporting in 2016.