±Recent Visitors

Recent Visitors to Com-Central!

±User Info-big


Welcome Anonymous

Nickname
Password

Membership:
Latest: HighestAce
New Today: 0
New Yesterday: 0
Overall: 6648

People Online:
Members: 0
Visitors: 289
Total: 289
Who Is Where:
 Visitors:
01: Home
02: Home
03: Community Forums
04: Home
05: Photo Gallery
06: Community Forums
07: Home
08: Community Forums
09: Photo Gallery
10: Photo Gallery
11: Community Forums
12: Photo Gallery
13: Home
14: Your Account
15: Community Forums
16: Community Forums
17: Downloads
18: Supporters
19: Downloads
20: Photo Gallery
21: Home
22: Photo Gallery
23: Home
24: Photo Gallery
25: Community Forums
26: Photo Gallery
27: Home
28: Photo Gallery
29: Community Forums
30: Home
31: Photo Gallery
32: Home
33: Home
34: Home
35: Statistics
36: Statistics
37: Home
38: Photo Gallery
39: Home
40: Photo Gallery
41: Community Forums
42: CPGlang
43: Home
44: Photo Gallery
45: Home
46: Photo Gallery
47: Photo Gallery
48: Community Forums
49: Photo Gallery
50: Community Forums
51: Home
52: Photo Gallery
53: Community Forums
54: Photo Gallery
55: Community Forums
56: Community Forums
57: Home
58: Community Forums
59: Photo Gallery
60: Home
61: Photo Gallery
62: Photo Gallery
63: Photo Gallery
64: Home
65: Photo Gallery
66: Community Forums
67: Downloads
68: Home
69: Community Forums
70: Community Forums
71: Community Forums
72: Member Screenshots
73: Community Forums
74: Photo Gallery
75: News
76: Home
77: Downloads
78: Photo Gallery
79: Home
80: Home
81: Photo Gallery
82: Home
83: Community Forums
84: Photo Gallery
85: Community Forums
86: Community Forums
87: Community Forums
88: Community Forums
89: Photo Gallery
90: Photo Gallery
91: Member Screenshots
92: Community Forums
93: Community Forums
94: Photo Gallery
95: Home
96: Community Forums
97: CPGlang
98: Photo Gallery
99: Downloads
100: Home
101: Community Forums
102: Home
103: Photo Gallery
104: Photo Gallery
105: Photo Gallery
106: CPGlang
107: Home
108: Home
109: Community Forums
110: Home
111: Downloads
112: Member Screenshots
113: Home
114: Home
115: Community Forums
116: Home
117: Downloads
118: Photo Gallery
119: Home
120: Community Forums
121: Community Forums
122: Photo Gallery
123: Home
124: Photo Gallery
125: Photo Gallery
126: Community Forums
127: Home
128: Photo Gallery
129: Home
130: Home
131: Photo Gallery
132: Photo Gallery
133: Community Forums
134: Home
135: Home
136: Home
137: Downloads
138: Home
139: Photo Gallery
140: Home
141: Home
142: Community Forums
143: News Archive
144: Community Forums
145: Photo Gallery
146: Photo Gallery
147: Community Forums
148: Community Forums
149: Downloads
150: News Archive
151: Home
152: Photo Gallery
153: Photo Gallery
154: Community Forums
155: Community Forums
156: Home
157: Home
158: Photo Gallery
159: Community Forums
160: Community Forums
161: Community Forums
162: Photo Gallery
163: Photo Gallery
164: Community Forums
165: Home
166: Home
167: Downloads
168: Community Forums
169: Downloads
170: Community Forums
171: Community Forums
172: News Archive
173: Community Forums
174: Community Forums
175: Home
176: Photo Gallery
177: Photo Gallery
178: Home
179: Home
180: Community Forums
181: Member Screenshots
182: Photo Gallery
183: Photo Gallery
184: Community Forums
185: Community Forums
186: Home
187: Photo Gallery
188: Community Forums
189: Community Forums
190: Member Screenshots
191: Community Forums
192: Community Forums
193: Photo Gallery
194: Photo Gallery
195: Photo Gallery
196: Member Screenshots
197: Community Forums
198: Community Forums
199: Community Forums
200: CPGlang
201: Community Forums
202: Statistics
203: Community Forums
204: CPGlang
205: Home
206: Home
207: Community Forums
208: Photo Gallery
209: Community Forums
210: Member Screenshots
211: Photo Gallery
212: Community Forums
213: Home
214: Community Forums
215: Photo Gallery
216: Home
217: Community Forums
218: Home
219: Your Account
220: Home
221: Photo Gallery
222: Home
223: Community Forums
224: Community Forums
225: Downloads
226: Community Forums
227: Photo Gallery
228: Community Forums
229: Photo Gallery
230: Photo Gallery
231: Photo Gallery
232: Community Forums
233: Community Forums
234: Community Forums
235: Community Forums
236: Community Forums
237: Photo Gallery
238: CPGlang
239: Photo Gallery
240: Home
241: Home
242: Home
243: Community Forums
244: Photo Gallery
245: CPGlang
246: News
247: Photo Gallery
248: Downloads
249: Photo Gallery
250: Community Forums
251: Community Forums
252: Community Forums
253: Community Forums
254: Photo Gallery
255: Home
256: CPGlang
257: Home
258: Home
259: Photo Gallery
260: Home
261: Photo Gallery
262: Downloads
263: Home
264: Home
265: Home
266: Photo Gallery
267: Photo Gallery
268: Photo Gallery
269: Home
270: Community Forums
271: Community Forums
272: Photo Gallery
273: Photo Gallery
274: Your Account
275: Community Forums
276: Community Forums
277: Community Forums
278: Community Forums
279: CPGlang
280: Community Forums
281: Photo Gallery
282: Community Forums
283: Home
284: Photo Gallery
285: Community Forums
286: Home
287: CPGlang
288: Photo Gallery
289: Photo Gallery

Staff Online:

No staff members are online!
Trojan Cryzip extorts decryption fee :: Archived
This is a forum for Software related items such as OS', Virus notices, cool or free programs, etc. Gaming software should go in the gaming folder pertaining to the current info.
Post new topic    Revive this topic    Printer Friendly Page     Forum Index ›  Software

Topic Archived View previous topic :: View next topic  
Author Message
Uhu_Rodion
Janitor

Offline Offline
Joined: Nov 14, 2004
Posts: 1437
Location: L'Aquila, Italy
PostPosted: Tue Mar 14, 2006 9:05 pm
Post subject: Trojan Cryzip extorts decryption fee

"A Trojan making the rounds encrypts victims' files and demands a $300 payment to have them decrypted and unlocked, according to a report by security firm Lurhq Threat Intelligence Group."

This so-called "ransomware" Trojan, dubbed Cryzip, is the second of its type to emerge in the past 10 months, following the PGPcoder Trojan. It also is the third such Trojan to appear since 1989.

Lurhq researchers noted Tuesday that the appearance within a year of two encryption Trojans may indicate they are part an emerging trend in malicious software.

"Last year, we saw the PGPcoder, and anything that shows itself to be a viable way to make money, usually people start jumping on the bandwagon after that," said Joe Stewart, senior security researcher for Lurhq.

The Cryzip Trojan will search for files, such as source code or database files, on infected systems. It then uses a commercial zip library to store the encrypted files. Security researchers, however, have yet to determine how the Trojan is distributed, noting it could come from a number of sources, including malicious Web sites, or enter through a previously created backdoor on a virus-infested computer.

The Trojan will overwrite the victims' text and then delete it, leaving only encrypted material that contains the original file name and _CRYPT_.ZIP.

"Unlike the PGPcoder that used a trivial encryption scheme, the zip encryption is stronger. It's harder to go through a list of possible (encryption) keys to get the information back," Stewart said. "But a brute-force attack is still possible, if a user has a copy of the original file. It can be reversed-engineered with a copy of the Trojan."

Cryzip has yet to become a widespread problem. Lurhq said it is aware of only about two dozen infection cases. Increasingly, malicious software writers are becoming more interested in launching low-level attacks in the hopes that it will take longer for security companies to notice their presence and develop a defense.

Users may also be less willing to seek help if it involves disclosing where they might have come across the threat.

The Cryzip writer, who uses an E-Gold account for collecting ransom payments, tells the victims: "Your computer catched our software while browsing illegal porn pages, all your documents, text files, databases was archived with long enough password. You cannot guess the password for your archived files--password length is more than 10 symbols that makes all password recovery programs fail to bruteforce it."

The Trojan writer then goes on to demand that a $300 payment be sent electronically to the E-Gold account.

Stewart advises users to frequently back up their important files, not only to minimize the damage if their system crashes but to reduce damage from an encryption attack.


-> news.zdnet.com/2100-10...ag=nl.e589


Marco
Back to top
View user's profile Visit poster's website MSN Messenger Photo Gallery
Shades
Forum Tree-Rat

Offline Offline
Joined: Mar 07, 2005
Posts: 6475
Location: 3rd Branch up, 'Ye Olde Oak', Green Wood.
PostPosted: Wed Mar 15, 2006 12:39 pm
Post subject: Re: Trojan Cryzip extorts decryption fee

Hang on... if there's an account, it's trackable.
And who's gonna make any online payments to someone writing this stuff anyway?
Geeze talk about unsafe.

_________________
Skwerl's place.

Com-Central's cutest, fluffiest, twitchiest, tail.
CPU > Intel i9-9900k (o/c 4.9GHz); COOLING > BeQuiet! Dark Rock Pro 4;
MOBO > ASUS PRIME Z390-A; RAM > 2x32GB Corsair LPX 2666MHz;
GPU > Gigabyte GEFORCE GTX650Ti PCI-e 3.0 2Gb GDDR5;
AUDIO > Creative X-Fi Xtreme Music (plus - Universal Audio UAD2 Quad Custom accelerator);
HDD > 3x1TB+ M.2. SSDs; LCD > DELL - S2419HGF (1920x1080);
PSU > 650W be quiet Straight Power 11 - 80+ Gold;
CASE > BeQuiet! SILENT BASE 601; OS > Windows 11 Home Advanced (64-bit).
Back to top
View user's profile Visit poster's website ICQ Number
Display posts from previous:   
Post new topic    Revive this topic    Printer Friendly Page    Forum Index ›  Software
Page 1 of 1
All times are GMT - 6 Hours

Archive Revive
Username:
This is an archived topic - your reply will not be appended here.
Instead, a new topic will be generated in the active forum.
The new topic will provide a reference link to this archived topic.