Bitcoin Forum
June 07, 2024, 11:45:17 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Bitcoin ransomware covered by CCTV  (Read 1442 times)
PremiumCodeX
Hero Member
*****
Offline Offline

Activity: 1204
Merit: 531


Metaverse 👾 Cyberweapons


View Profile
May 03, 2015, 10:26:13 PM
 #21

It's important to save backup frequently. These days there are many easy to use and reliable cloud based and physical storage to store your data so in most cases it's up to you to take care of it.

Many of the ransomware cases were done with insider help. Profit is shared half half with the Russian coder.

This. Someone had been infected with a ransomware that detected the user's nation and asked for ransom in his language and in BTC. It even offered an exchange service to use to convert the national currency into BTC lol This person had important files on his HDD so he decided to pay the ransom in the way the program asked for it and in the end his computer got unlocked.

[TUTORIAL] How to steal $350 000?
Best OS for recovering stolen BTCs.
Visit our FREE Bitcointalk thread.
hl5460 (OP)
Legendary
*
Offline Offline

Activity: 1620
Merit: 1000


news.8btc.com


View Profile WWW
May 04, 2015, 04:12:28 AM
 #22

The weibo has been reposted over 2000 times

And on TV

louise123
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250



View Profile
May 04, 2015, 07:01:46 AM
 #23

Guys, nobody has answered my question so far:

This trojan has to be ran by the victim right?
And it's send through email?


Much viruses and malware need the user of the computer, aka victim, to run an unsuspected file to be infected. Email is only one of the main source of these malwares. Others ways include plugging in a usb flash disks, downloading and viewing a pdf document.

PDF documents?
How does that work?
I have never heard of that before.
This is the first time I heard that.


██████
███
███
███
███
███
███
███
███
███
███
███
███
                ▄███
             ▄███▌ █
            ▀▀▀██▄  █
          ▄███▄▄ ▀▀▀█
         █ █████▀▀▀▄▄
        ▄██ ███▄    █
       ▐███▀   ▀█   █
       ████     █   █
      ▄██▀▄█▄▄▄█▀   █
      ▀▄▄███▌      █
  ▄▄▄▀▀▀████       █
▄▀    ██ ██       █
▐▌     ██▌▐▌      ▀▄
█      ██ █         ▀▄
█      █▀▄▌          █
█   ▄▀█▄██           █
█ ▄▀      ▀▀▄▄▀▄     █
▀▀             █    █
              █  ▄▀
              ▀▄█
     ▀█████████████▄▄
 ▀ ▀▀▀███████████████▌
  ▀ ▀▀▀▀██▀▀▀▀▀▀██████         ▄███████▄      ▄▄███████▄    ▄███▄    ▄███▄ ▄███▄      ▄███▄
▀ ▀▀▀▀█████▄▄▄▄▄▄█████▌       ▄████▀▀▀████▄   ▐████▀▀█████   ▀████▄ ▄████▀ █████▄    ▄█████
   ▀▀███████████████▀       █████     ████▌          ████▌    ▀████████▀    █████▄  ▄█████▌
  ▀ ▀████████████████▀ ▀    ██████████████▌   ▄▄██████████     ▄██████▄      █████▄▄█████▌
    ██████      ██▀▀▀▀▀▀▀ ▀ █████▀▀▀▀▀▀▀▀    █████▀▀▀█████    ▄████████▄      ██████████▌
    ██████▄▄▄▄▄▄██████▄ ▄    ████▄▄   ▄▄█▄   ████▄  ▄█████ ▄█████▀▀█████▄     ████████▌
    █████████████████▀        ▀███████████   ▀████████████  ████▀    ▀████      ██████▌
    ██████████████▀▀             ▀▀▀▀▀▀▀       ▀▀▀▀▀▀ ▀▀▀    ▀▀        ▀▀        █████
                                                                               ▄█████
                                                                           ▄███████▀
                                                                           ▀████▀▀
███
███
███
███
███
███
███
███
███
███
███
███
██████
|█████████████████
███████████████████
█████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
  WHITEPAPER 
 LIGHTPAPER
|Instant Deposit
✓ 24/7 Support
Referral Program
MakingMoneyHoney
Hero Member
*****
Offline Offline

Activity: 504
Merit: 500



View Profile
May 04, 2015, 03:53:27 PM
 #24

Guys, nobody has answered my question so far:

This trojan has to be ran by the victim right?
And it's send through email?


Much viruses and malware need the user of the computer, aka victim, to run an unsuspected file to be infected. Email is only one of the main source of these malwares. Others ways include plugging in a usb flash disks, downloading and viewing a pdf document.

PDF documents?
How does that work?
I have never heard of that before.
This is the first time I heard that.

Check out this link from malwarebytes: https://blog.malwarebytes.org/intelligence/2013/08/the-malware-archives-pdf-files/

and from AppleInsider about Macs:

http://appleinsider.com/articles/11/09/23/researchers_discover_pdf_malware_that_targets_apples_mac_os_x
PremiumCodeX
Hero Member
*****
Offline Offline

Activity: 1204
Merit: 531


Metaverse 👾 Cyberweapons


View Profile
May 04, 2015, 06:33:26 PM
 #25

Guys, nobody has answered my question so far:

This trojan has to be ran by the victim right?
And it's send through email?


Much viruses and malware need the user of the computer, aka victim, to run an unsuspected file to be infected. Email is only one of the main source of these malwares. Others ways include plugging in a usb flash disks, downloading and viewing a pdf document.

PDF documents?
How does that work?
I have never heard of that before.
This is the first time I heard that.



There is a way called extension spoofing. Using the appropriate tool anyone can do it and it can be used to trick users download and run malicious files as well as files with malicious code attached to them. You can use extension spoofing on a huge variety of extensions but besides PDF is an especially vulnerable extension.

[TUTORIAL] How to steal $350 000?
Best OS for recovering stolen BTCs.
Visit our FREE Bitcointalk thread.
Mt. Gox
Full Member
***
Offline Offline

Activity: 350
Merit: 118



View Profile
May 15, 2015, 06:23:36 AM
 #26

lol i can't translate those text in the image, is there any text version available?  Roll Eyes

Try this.

Strange. That link just takes me to a login page in Chinese...

Do not use proxy. Proxies are being re-directed to login. This is the link...

http://weibo.com/3552119670/Cg6HS4D9W

...and here is the translation...

Quote
@ CCTV News
[Mo open strange e-mail in English spread! ] New Trojan virus struck, the most vulnerable foreign workers caught! It is spread through corporate and personal mail, e-mail in English, the Trojans were generally means "order" "Product Details" and so on, can be deceptive. Once caught, the computer 114 kinds of file formats will all be the Trojan encrypted and can not be opened. Want to restore a file, the only way is to pay a ransom to the Bitcoin Trojan author. (CCTV reporter Sun Yang)

I wasn't using a proxy. I think there might be some sort of geographical restriction which is redirecting non-Chinese IPs to a login page.

This is the page I get:

http://www.weibo.com/login.php

Anyway, thanks for the translation. It sounds like a variant of the CryptoLocker virus.

So if I understand correctly, a user needs to run this file first?
Which is sent to them via email?

If it's anything like the CryptoLocker trojan, then yes, it would need to be run.

Another ransomware case, are antiviruses able to identify it still or not? I think it's designed for windows only right? Or can it spread in Linux and Mac too?

Again, I'm only familiar with CryptoLocker but if it's anything similar then it should be Windows-specific. Malware which can infect OS X and Linux are quite rare.

It's going to be difficult to stop Ransomware. Once the Trojan is triggered all files targeted will be encrypted and then you are stuffed.

Without the key, your files are gone...

The only way to reduce the damage, will be to do regular offline backups. If you are hit, you could just restore the files and only lose the files that was not being backed up.

Most office workers do not make backups regularly.  Sad 

Businesses will probably start forcing backups soon if they haven't already been doing so. If everyone had backups, these ransom hackers would be out of business.

to be honest backup should be mandatory regardless of virus or other things, what if your hdd fail or other random crap like that? i've always an entire backup of my ssd in a usb pen drive

in this situation the victim could have just restored everything in no time without paying that crazy amount

It's also recommended to have backups of your backups.

And even that isn't necessarily going to be 100% successful. Stefan Thomas who is a Bitcoin core developer once lost a substantial amount of BTC because both his backups managed to fail simultaneously:

Quote from: Bitcoin Magazine
The Stefan Thomas Loss

This next incident is also fairly ancient in Bitcoin terms, taking place in July 2011, illustrates how wallet security can also fail in the other direction. Bitcoin developer Stefan Thomas had three backups of his wallet – an encrypted USB stick, a Dropbox account and a Virtualbox virtual machine. However, he managed to erase two of them and forget the password to the third, forever losing access to 7,000 BTC (worth $125,000 at the time). Thomas’s reaction: "[I’m] pretty dedicated to creating better clients since then."

Link: http://bitcoinmagazine.com/4628/bitcoin-self-defense-part-i-wallet-protection/

Guys, nobody has answered my question so far:

This trojan has to be ran by the victim right?
And it's send through email?


Much viruses and malware need the user of the computer, aka victim, to run an unsuspected file to be infected. Email is only one of the main source of these malwares. Others ways include plugging in a usb flash disks, downloading and viewing a pdf document.

PDF documents?
How does that work?
I have never heard of that before.
This is the first time I heard that.



There is a way called extension spoofing. Using the appropriate tool anyone can do it and it can be used to trick users download and run malicious files as well as files with malicious code attached to them. You can use extension spoofing on a huge variety of extensions but besides PDF is an especially vulnerable extension.

Basically this is correct. The Wikipedia article goes into more detail about the issue with extensions:

Quote from: Wikipedia
CryptoLocker typically propagated as an attachment to a seemingly innocuous e-mail message, which appears to have been sent by a legitimate company. A ZIP file attached to an email message contains an executable file with the filename and the icon disguised as a PDF file, taking advantage of Windows' default behaviour of hiding the extension from file names to disguise the real .EXE extension. CryptoLocker was also propagated using the Gameover ZeuS trojan and botnet.

Not to mention Acrobat Reader can also have vulnerabilities of its own which can be exploited if left unpatched:

http://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-497/Adobe-Acrobat-Reader.html

Dear GOD/GODS and/or anyone else who can HELP ME (e.g. MEMBERS OF SUPER-INTELLIGENT ALIEN CIVILIZATIONS): The next time I wake up, please change my physical form to that of FINN MCMILLAN of SOUTH NEW BRIGHTON at 8 YEARS OLD and keep it that way FOREVER. I am so sick of this chubby Asian man body! Thank you! - CHAUL JHIN KIM (a.k.a. A DESPERATE SOUL) P.S. If anyone is reading this then please pray for me! [ www.chauljhin.com ]
solstoce
Full Member
***
Offline Offline

Activity: 219
Merit: 100


View Profile
May 15, 2015, 06:32:59 AM
 #27

Mining gets less profitable they will do anything for there BTC
louise123
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250



View Profile
May 15, 2015, 07:03:45 AM
 #28

Guys, nobody has answered my question so far:

This trojan has to be ran by the victim right?
And it's send through email?


Much viruses and malware need the user of the computer, aka victim, to run an unsuspected file to be infected. Email is only one of the main source of these malwares. Others ways include plugging in a usb flash disks, downloading and viewing a pdf document.

PDF documents?
How does that work?
I have never heard of that before.
This is the first time I heard that.

Check out this link from malwarebytes: https://blog.malwarebytes.org/intelligence/2013/08/the-malware-archives-pdf-files/

and from AppleInsider about Macs:

http://appleinsider.com/articles/11/09/23/researchers_discover_pdf_malware_that_targets_apples_mac_os_x

Thanks for the links.
I doubt that I would ever go through that process, so I have just downloaded Malwarebytes  Cheesy

██████
███
███
███
███
███
███
███
███
███
███
███
███
                ▄███
             ▄███▌ █
            ▀▀▀██▄  █
          ▄███▄▄ ▀▀▀█
         █ █████▀▀▀▄▄
        ▄██ ███▄    █
       ▐███▀   ▀█   █
       ████     █   █
      ▄██▀▄█▄▄▄█▀   █
      ▀▄▄███▌      █
  ▄▄▄▀▀▀████       █
▄▀    ██ ██       █
▐▌     ██▌▐▌      ▀▄
█      ██ █         ▀▄
█      █▀▄▌          █
█   ▄▀█▄██           █
█ ▄▀      ▀▀▄▄▀▄     █
▀▀             █    █
              █  ▄▀
              ▀▄█
     ▀█████████████▄▄
 ▀ ▀▀▀███████████████▌
  ▀ ▀▀▀▀██▀▀▀▀▀▀██████         ▄███████▄      ▄▄███████▄    ▄███▄    ▄███▄ ▄███▄      ▄███▄
▀ ▀▀▀▀█████▄▄▄▄▄▄█████▌       ▄████▀▀▀████▄   ▐████▀▀█████   ▀████▄ ▄████▀ █████▄    ▄█████
   ▀▀███████████████▀       █████     ████▌          ████▌    ▀████████▀    █████▄  ▄█████▌
  ▀ ▀████████████████▀ ▀    ██████████████▌   ▄▄██████████     ▄██████▄      █████▄▄█████▌
    ██████      ██▀▀▀▀▀▀▀ ▀ █████▀▀▀▀▀▀▀▀    █████▀▀▀█████    ▄████████▄      ██████████▌
    ██████▄▄▄▄▄▄██████▄ ▄    ████▄▄   ▄▄█▄   ████▄  ▄█████ ▄█████▀▀█████▄     ████████▌
    █████████████████▀        ▀███████████   ▀████████████  ████▀    ▀████      ██████▌
    ██████████████▀▀             ▀▀▀▀▀▀▀       ▀▀▀▀▀▀ ▀▀▀    ▀▀        ▀▀        █████
                                                                               ▄█████
                                                                           ▄███████▀
                                                                           ▀████▀▀
███
███
███
███
███
███
███
███
███
███
███
███
██████
|█████████████████
███████████████████
█████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
  WHITEPAPER 
 LIGHTPAPER
|Instant Deposit
✓ 24/7 Support
Referral Program
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!