In the real world, when you hear the word ransom, you immediately think someone or something is being held hostage until demands are met, which is usually in the form of a payment. The same holds true virally or in cyberspace. Ransomware is a malicious computer program used to hurl threats at unwary PC users who may have failed to secure their system with stealth Internet security protection or measures. Depending on the malware builder will determine the threat level and what true technical challenges, if any, will be waged. However, at a minimum, your data and system resources will be placed at risk.

Ransomware shares common distribution vectors used for other malicious programs because they still work. Unfortunately, many PC users continue clicking much too fast on links or attachments without verifying the source. If your computer is not properly secured by a stealth antimalware program, you are absence a safety net to catch your missteps, i.e. clicking on a poisonous link or attachment or landing on a compromised website housing a Trojan downloader. A stealth antimalware solution uses a mix of scanning techniques that include parsing of code or sandboxing to get a closer inspection of what the program ‘really’ intends to do. If a malicious or even suspicious behavior is uncovered, the download will be blocked.

Similar to the real world, viral kidnappings or hostage takeovers involve three main components: possession, threat or demand (ransom note) and instructions for payment. Most ransomware (or ransom notes) are accusatory, making false claims of online criminal or immoral acts (i.e. pirating, copyright infringement or watching porn, child or adult). There are many variations currently running wild on the Internet, but an example ransom note (English translation) might reads as follows:

“Attention! Illegal activity was detected. The operating system was locked for infringement against the laws of Switzerland. Your IP address is [REMOVED]. From this IP address, sites containing pornography, child pornography, bestiality and violence against children were browsed. Your computer also has video files with pornographic content, elements of violence and child pornography. Emails with terrorist background were also spammed. This serves to lock the computer to stop your illegal activities”.

The victim may be threatened with jail time or erasure of valuable data stored on the system, so a complete crash and wipeout. At a minimum, the victim will be not able to use his or her system as before until matters have been addressed, i.e. ransom payment or in reality, removal of the infection. As with many ransomware, NEVER did the offender (cybercrook) intend to release or unlock the system or data. Rather, the primary goal is to cheat the victim out of money and secondarily, violate the victim’s intellectual property further, i.e. steal stored data, misuse of system resources, etc.

First of all, threats that claim to send police or legal authorities to your doorsteps to confiscate your intellectual property containing the ‘evidence’ is simply ludicrous! Had the ‘real’ authorities been involved, they would not have given you a heads up or communicated by computer. Rather, you would have been ambushed and most likely your ISP provider would have commandeered the digital lockdown. Even more logical is your (aka the victim’s) ability to destroy all evidence after being provided a heads up, so why would you even think to pay up ransom! Other impersonations might be a call from Microsoft personnel (again, a fake) or Web Cam recordings as evidence of who you are and so on.

Threats are usually followed up by a deadline in which ransom must be paid and of course, the preferred method of payment. Scared or guilty parties who give into the demands are provided instructions that involve online payment services such as Ukash vouchers or prepaid card services like MoneyPak. Cybercriminals prefer these type services because they offer quick payment and are hard to trace, thus aiding in their getaway. Technically speaking, many of these threats are idle in such the actual ransomware is absent of true programming to carry out its threats of data erasure and, as previously mentioned, makes empty threats of sending police to your doorsteps to arrest you. However, there are ransomware programs in the wild that are stealth and can indeed make good on threats as they relate to encrypting and destroying valuable data. In fact, some malicious programs will cause a total wipeout by crashing the system’s drive. Therefore, do not ignore ransomware but rather answer aggressively by removing immediately.

In the case of using Ukash vouchers, they come in preset denominations and if the ransom falls between the set value (i.e. ransom is $75 but set values are either $50 or $100, thus requiring the purchase of the higher amount), legitimate services would usually refund the difference by issuing a PIN. As expected, the criminal receiver does not make good on refunds and also no surprise, the victim is denied the needed code to unlock their system or restore it back to its normal use. Like all malware tools, ransomware was never intended to benefit you but rather the sinister creator or buyer. Also, similar to other malware, ransomware has a hidden agenda that involves an underlying or background attack on vital data and system resources. From the time the malicious program landed inside your system, the following was arranged:
  • Opening of a two-way port to report successful infiltration and implantation of malicious files and components. New instructions may be issued or more malicious files downloaded. A backdoor will be left open to allow a hacker to gain remote access, add the infected system to a bot and maliciously use the system resources to jam up web traffic of targeted and fundamental websites.
  • Malicious files supporting the breach, including encryption coding (if so ordered), will be put into play, including a malicious executable added in memory that rejuvenate the attack at each new boot.
  • Weaker antivirus tools will be deactivated, including halting of Windows security updates.
  • Administrative controls that aid in either detection or removal will be disabled.
  • The operating system will too be negatively impacted so that the only screen visible and running will be that of the ransom note.
While manual removal is not impossible, it will be quite challenging for the novice PC user. Malware infused with rootkit technology is able to hook legitimate running processes and mask malicious files by naming them the same as legitimate OS services and files. Deleting or removing the wrong ones could make matters worse and the threat of losing data could be exacted by your own hands. Therefore, to combat such intrusive and aggressive malware successfully, you should rely on a formidable opponent, a stealth antimalware solution already tried and tested and able to remove infections without causing further harm.

How Can You Detect Ransomware?

Download SpyHunter’s Detection Scanner
to Detect Ransomware.

Most Trending Ransomware in the Last 7 Days

Threat Name Threat Level Alias Detection Count Date
1010/10 N/A N/A 09/11/2013 11:23:26 EST
1010/10 N/A N/A 05/12/2014 09:44:34 EST

There are 356 articles listed on ransomware.

Name Threat Level Detection Count Date
CryptoFortress 03/18/2015 14:33:16 EST
‘Achtung!!! Ein Vorgang illegaler Aktivitaten wurde erkannt’ Ransomware 08/21/2012 15:01:07 EST
‘Agence Nationale de la Sécurité des Systèmes D’information’ Virus 07/17/2013 12:02:31 EST
‘Agencia Federal de Investigación’ Ransomware 08/03/2013 19:36:00 EST
‘All Activities of This Computer Have Been Recorded’ Ransomware 07/15/2013 11:07:32 EST
‘An Garda Siochana’ Ransomware 08/16/2012 10:12:34 EST
‘Arma dei Carabinieri’ Ransomware 1010/10 30 08/02/2013 10:32:55 EST
‘Attention! Online Agent has blocked your computer for security reason’ Ransomware 1010/10 95 09/09/2013 13:52:39 EST
‘Attention! Votre ordinateur a ete pour violation’ Ransomware 08/21/2012 15:11:07 EST
‘Az ön számítógépe blokkolásra került. Magyar Rendőrség’ Ransomware 12/27/2012 15:26:57 EST
‘BK LPD’ Ransomware 08/07/2013 07:22:59 EST
‘Bllgisayarinizin Bloke Edilmiştir. Türk Polisi’ Ransomware 12/27/2012 10:40:15 EST
‘Bundesamt für Sicherheit in der Informationstechnik’ Ransomware 1010/10 12 03/28/2014 10:18:24 EST
‘Canadian Association of Chiefs of Police’ Ransomware 07/21/2013 11:14:26 EST
‘Canadian Police Association’ Ransomware (Virus) 11/16/2012 12:01:39 EST
‘Central Security Service’ Ransomware 1010/10 9 03/18/2015 15:58:12 EST
‘Centre for Critical Infrastructure Protection (CCIP)’ Virus Ransomware 03/12/2014 18:55:49 EST
‘Comandancia General de Policía’ Ransomware 07/29/2013 10:43:56 EST
‘Computer Crime & Intellectual Property Section’ Ransomware 08/16/2012 10:10:46 EST
‘Computer Crime Prosecution Section’ Ransomware 08/14/2013 09:12:38 EST
‘Computer Incident Response Center Luxembourg’ Virus Ransomware 08/12/2013 18:59:08 EST
‘Computeren er Blevet Blokeret’ Ransomware 1010/10 64 12/03/2012 09:11:23 EST
‘Council of Europe’ Ransomware 03/13/2014 15:32:01 EST
‘Cyber Command of Arizona’ Ransomware 10/17/2013 11:13:18 EST
‘Cyber Command of California’ Ransomware 01/08/2015 10:36:20 EST

Page(s): 1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  

Search by Letter: A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  
Home > Threat Database > Ransomware
Home | SpyHunter Risk Assessment Model | Privacy Policy | EULA | Additional Terms and Conditions
Copyright 2003-2015. Enigma Software Group USA, LLC. All Rights Reserved.