New generation extortion trojan detection
The new generation of extortion trojans is much more dangerous because of the use of an anonymous TOR network and a stronger encryption method.
Ransomware are the most annoying types of malware because they have the ability to encrypt user data and then demand ransom to decrypt. The preferred form of trading by bad guys is to use free currencies like Bitcoin . In most cases of infection, ransomware removal is not difficult, but this does not help users retrieve their valuable data.
Recently, the ransomware wave was even more dangerous when Kaspersky recently announced the discovery of a new threat called CTB-Locker, also known as Critroni or Onion, which is a ransomware type using an anonymous TOR system. Trend Micro also said it has discovered a new type of extortion Crytoblocker trojan that is seen as the next generation of CryptoLocker; and Synology customers are now the target of this new generation of ransomware.
Stu Sjouwerman, CEO of KnowBe4 ( a company specializing in security awareness training ) added that the new generation of CTB-Locker extortion trojans probably originated from an Eastern European country like Romania or Ukaraine because of a The first number of cases were detected in Russia. Russian criminals never attacked their own countries because if they did, they would be immediately arrested by security agencies.
The reason for the new generation of extortion trojans is more dangerous because according to KnowBe4, CTB-Locker uses an anonymous TOR network to control attack servers ( C&C servers ), so it is difficult to intercept. CTB-Locker also has the ability to compress data before encryption. In addition, the new generation extortion trojan also uses the Elliptic Curve Diffie-Hellman encryption method, which is rarely used but is a very powerful encryption method. In particular, CTB-Locker is built as a commercial software, so it can be widely traded in cybercrime world.
As I said before, the best way to protect users from ransomware is not to open suspicious attachments without checking the virus first. In addition, software should not be downloaded from unknown sites. And let's get to the habit of regularly backing up personal data in different locations ( online as well as offline ) to ensure there's always a backup copy even if ransomware wreaks havoc on your system.
You should read it
- Warning: New extortion code GandCrab is attacking Vietnamese Internet users
- Learn about Pumas extortion software
- Theory - What is Ransomware?
- Ako ransomware is raging all over the world, what do you know about this ransomware?
- Risks from malware and how to prevent it
- No More Ransom - the flag of the war against ransomware
- 5 biggest ransomware attacks in the last 5 years
- Lukitus Guide to preventing extortion malicious code
May be interested
- What is Trojan Dropper?one particular program used by cyber criminals in their illegal transactions is the trojan dropper program. so how does this happen and how can you prevent it?
- Trojan 2.0 - Implications of Web 2.0 technologyfinjan malware research center has just released the fourth security risk report. accordingly, measures against traditional malware - signature-based (virus detection based on a database of known malware software) and
- New Trojan keylogger disables both virtual keyboardsvirtual keyboard which is considered a salvage solution for users before the keylogger threat has now lost its advantage over the new generation of keylog malware.
- Again Trojan appeared to attack Mac OSsecuremac, in a security warning message last week, said the applescript.tht trojan was released through a number of malicious websites.
- Appeared Trojans spy on businessesbitdefender warned of the dangers of a new spy trojan described by them as 'scary rivals', which can be used as an enterprise scout tool.
- Difference between Cyber Extortion and Ransomwarealthough these two terms are often confused, there is a difference between ransomware and cyber extortion. however, this pair is linked and one can lead to the other.
- Intrusion detection system (IDS) (Part 1)ids (intrusion detection systems) is a device or software that monitors network traffic, suspicious behaviors and alerts for system administrators.
- The fake Trojan add-on Trojan is extremely dangeroussecurity firm mcafee yesterday discovered a fake trojan as an add-on for the firefox browser to break into users' systems.
- Appeared trojan trojan antivirus tool for mobilethis trojan called doomboot.g specializes in pretending to be an antivirus application called exovirusstop by exosyphen studios. jarno niemela, a virus researcher with security firm f-secure, said that this was the first trojan to attack
- Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking informationafter 5 months of silence, from february 2020 until now, the emotet trojan has just officially returned with a larger scale.