Sneaky Blackmailing Virus That Encrypts Data 409
BaCa writes "Kaspersky Lab found a new variant of Gpcode which encrypts files with various extensions using an RSA encryption algorithm with a 1024-bit key. After Gpcode.ak encrypts files on the victim machine, it changes the extension of these files to ._CRYPT and places a text file named !_READ_ME_!.txt in the same folder. In the text file the criminal tells the victims that the file has been encrypted and offers to sell them a decryptor. Is this a look into the future where the majority of malware will function based on extortion?"
But were they smart, or stupid? (Score:5, Interesting)
Re:But were they smart, or stupid? (Score:4, Insightful)
besides... do you really expect to get your data back after a hack like that? you're system is hosed, any correspondence with the malware author is only going to lead to more loss.
you got pwnd, restore from backup, call the FBI if you're a good corporate citizen and have nothing to hide. Otherwise, get a Mac.
Re:But were they smart, or stupid? (Score:5, Insightful)
I would happily contact the criminal and send them $1 after working with my bank and law enforcement to set up an account trace to see where the money goes and who ends up with it.
Re:But were they smart, or stupid? (Score:5, Insightful)
> where the money goes and who ends up with it.
Yeah, because they'd never have thought of that.
Re:But were they smart, or stupid? (Score:5, Informative)
You are asked to send money through Western Union or some other provider that doesn't check your ID for amounts smaller than a few thousand USD. Then they send some bum to one of the thousand WD offices, somewhere on this planet, with the withdrawal code. And only once they get your money, you get your decryption key.
So, now you know where the money ends up, and why police can't do jack about it.
Re:But were they smart, or stupid? (Score:5, Informative)
"And only once they get your money, you don't get your decryption key."
There, fixed that for you. :-)
Re:But were they smart, or stupid? (Score:5, Funny)
As a telegram? Do they still exist?
Re:But were they smart, or stupid? (Score:5, Informative)
Re:But were they smart, or stupid? (Score:5, Funny)
Re:But were they smart, or stupid? (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:3, Informative)
Re:But were they smart, or stupid? (Score:5, Funny)
Jeez. If not - I'd fill out the form saying the payment was to help Osama Bin Laden buy some Yellow Cake Uranium-flavoured rolling papers that had pictures of Child Porn on ons side, and copy written Metallica lyrics and Vista Activation codes on the other. Surely one of our many country's many Big Brother Agency would ensure the black mailer had a quick career change.
Re:But were they smart, or stupid? (Score:4, Insightful)
Re:But were they smart, or stupid? (Score:4, Funny)
Oh please! We all know there aren't any REAL banks (Score:5, Informative)
in Nigeria?
There are real banks in Nigeria, owned by the ruling ethnic group, that's where the billions of dollars from oil goes. The rulers get their money while those who live where the oil comes from, the Niger Delta [realclearpolitics.com], have to fight for scraps.
FalconRe:Oh please! We all know there aren't any REAL ba (Score:3, Funny)
Re:Oh please! We all know there aren't any REAL ba (Score:4, Interesting)
Banking in Nigeria is not significantly less reputable than anywhere else.
The problem with Nigerian scams is because there are a lot Nigerians, and a significant fraction of them do not trust random people they don't know from Adam (or in some cases, members of their own family) and think that "europeans" must be a bunch of illiterate cretins if they are willing to believe things they read in random e-mails from strangers, and hence deserve to be scammed.
The main factor in Nigerian fraud, is that part of the Nigerian population that believe that God created cretins so they could be scammed. Not a very christian beliefe:
Yes its true, Christianity would stop Nigerian scams - send more missionaries :-)
Yes, I have been to Nigeria.
Re: (Score:3, Insightful)
The main factor in Nigerian fraud, is that part of the Nigerian population that believe that God created cretins so they could be scammed. Not a very christian beliefe:
Yes its true, Christianity would stop Nigerian scams - send more missionaries
I can't help but notice that if you are correct, what might help them even more is not believing in silly propositions like "God" and "Christianity."
Re:But were they smart, or stupid? (Score:5, Funny)
Re:But were they smart, or stupid? (Score:4, Insightful)
you got pwnd, restore from backup, call the FBI if you're a good corporate citizen and have nothing to hide. Otherwise, get a Mac.
Getting a Mac will help for a while, but as more people switch to Macs malcontents will target OS X. And while it's more secure it's not totally secure, nothing is.
Falcon
Oh, and I'm not an MS fanbous, my desktop PC's OS is Linux and the laptop I'm typing this on is a MacBook Pro.Re:But were they smart, or stupid? (Score:5, Funny)
He did say "good corporate citizen", so if you are not paying for it, you obviously have something to hide and should be reported.
Damn commie scum.
Re:But were they smart, or stupid? (Score:5, Interesting)
You may think this is just a joke, but when my second college roommate saw me using an unfamiliar operating system, he naturally started asking me about it. "What's it called?" "Red Hat Linux." "How much does it cost?" "Nothing, it's free." He freaked out: "Oh my God, how can that be legal? That could cost Microsoft so much in lost profits! That should really be illegal..."
The worst part? He was a business major, an honest-to-goodness PHB in training...
Re:But were they smart, or stupid? (Score:5, Insightful)
I hope you promptly yelled "WHAT THE FUCK IS WRONG WITH YOU?!" and slapped some sense into him.
Re: (Score:3, Interesting)
Re: (Score:3, Insightful)
And do you also express your appreciation of Wikipedia by donating to the EFF?
Re: (Score:3, Insightful)
Re:But were they smart, or stupid? (Score:4, Interesting)
Re:But were they smart, or stupid? (Score:4, Insightful)
Corporate Linux users generally *do* pay (Score:3, Informative)
Re: (Score:3, Informative)
RedHat and Novell have anted up to the table and can offer Linux desktops and servers in an industry that pretty much was Windows only, other than maybe a Solaris or AIX box here and there. Part of what people pay for when purchasing commercial support for RHCE or SUSE is the cost of this.
OBMac: MacOS 10 too has recently gotten FIPS certified, so that is another UNIX that is usab
Re: (Score:3, Informative)
OS X is reasonably secure, but so is Linux. And while harder, Windows can also be made that way. Just because your Mac hasn't been pwned yet doesn't mean that it won't. The only secure OS is one that doesn't do anything.
Macs are actually 24 years old, and there were Mac OS viruses out there. The hardware features of automagically reading a floppy inserted into the drive made the spread of those viruses much more easy.
Sheldon
Re: (Score:2, Insightful)
Re:But were they smart, or stupid? (Score:5, Insightful)
Fear, and adware. For example, if this virus becomes really widespread, the malware author could create a rouge anti-virus program that promises to get rid of it, and might even get rid of it, the downside is, it infects the host machine with adware giving the author $$$. Otherwise he can simply modify the script to not only encrypt it but add some adware into there. If you have root, there isn't much you can't do.
Re:But were they smart, or stupid? (Score:5, Funny)
But a crimson anti-virus program can detect a rouge one.
Re: (Score:3, Funny)
Re: (Score:3, Informative)
Does it matter? I have backups.
Really, this doesn't scare me very much. Can these people stop making money on spam, please, and let them try their hand at blackmail? Because it's fine-- a lot of people won't pay, and others will get the FBI to trace the money to the criminals behind it. They'll probably get caught, but either way they won't get me. Like any sane person, I have a firewall, don't open random attachments, and keep backups.
Re:But were they smart, or stupid? (Score:5, Insightful)
Does it matter? I have backups.
And how often do you roll through your backups? Will you notice the encrypted files in time, or will you end up backing up the worthless files instead?
I have plenty of important files which I don't look at very often. It might take months before I realize they are corrupted -- and by that time, I've overwritten the last valid backup with the encrypted stuff.
Re:But were they smart, or stupid? (Score:4, Funny)
Re:But were they smart, or stupid? (Score:4, Informative)
Unless you have space for infinite backups, his method is write. At some point, you'll run out of space and have to delete old backups to make room for the new ones.
Re:But were they smart, or stupid? (Score:5, Informative)
And given that most people work in files which are essentially text or the moral equivalent (Word docs, etc), it's likely that you do, in fact, have enough space for a very, very large number of backups.
Re:But were they smart, or stupid? (Score:4, Informative)
For that matter, these are also things which don't change a lot. They shouldn't take up too much space in the backup, if you're using even a halfway-intelligent backup program -- both of the ones you mentioned at least do hardlinks.
The real danger here would be if the program actually corrupted the entire backup repository. For that to happen, it would have to know when your backup hard drive was plugged in -- and there are other ways of avoiding this, such as running backups over a network to a server with limited access.
Re:Vista (Score:4, Insightful)
Most people aren't going to have more than a hundred gigs or so of storage in their computer in the first place. Given a halfway-decent backup system -- one which uses hardlinks, as I mentioned before -- and yes, the OS might take half of the backup drive. It will not, however, need an additional half every incremental backup -- only every time the OS changes.
As most people aren't causing terabytes worth of change, it should be no problem to have many backups (as in, every day for the past few months) on a single, dirt-cheap external hard drive.
Re: (Score:3, Insightful)
Both at home and at work, I have better things to spend my hardware budget on than insuring that restoring a PC 2 years down the road will be slightly more convenient. Besides, the vast majority of Windows reinstalls that I do are a result of spyware infestations, not hardware failures. In that situation, I'm still reinstalling the OS regardless of how complete a backup
Re:But were they smart, or stupid? (Score:5, Informative)
try 'never i use 1 time recordable optical media'
i realize some people use 'rewritable' media for backups, and have this 'roll over' issue, but the only part of my backup that does rollover is the redundant external HDD for 'critical' data that i don't trust entirely to a DVD media, even is i only buy grade 1 media...
I don't have a small data set either, I have over 1 TB of stuff on optical discs, but surprisingly only about 30 gigs that is important enough to go to a redundant hdd.
Re: (Score:3, Informative)
I don't know about most people, but my backups bear a strong resemblance to a versioned filesystem: it doesn't matter if the encrypted files wind up on the backup, because I can always roll back to a version before they were encrypted.
Re:But were they smart, or stupid? (Score:4, Interesting)
In which case the virus writer never gets payed, since his yahoo email account is probably long disabled by then.
There's no point in delaying extortion. The kind of people who decide to run malware, are the same kind of people who don't have any backups, so they're ready to collect from, immediately.
Re:But were they smart, or stupid? (Score:5, Informative)
Re: (Score:3, Insightful)
Backups require a chain of items to work correctly come restore time. You have to have something to read the backup media if its stored on CDs, DVDs, or tapes. You have to have the correct software and version of software. You also have to be able to get a dead machine in some state to be able to be restored, either by booting an OS or BartPE
Reminds me of... (Score:4, Interesting)
The virus takes your FAT and stores it in RAM. Then lets you play a slot-machine game. If you win, you get your data back. If you lose, you lose your data. Some other combination of characters (in the slot machine) gives you the virus-writer's phone number.
Re:Reminds me of... (Score:4, Funny)
But for how long. (Score:3, Interesting)
Re:But were they smart, or stupid? (Score:5, Insightful)
Okay, it might be. Imagine it repeating the process on many files, each time a new file is written it may fill the space of the last deleted one. This also depends on the file system, OS strategy, file sizes, etc.
Using an undelete utility means you risk recovering many corrupt files. That may be better than nothing or sending money to a malware author, which as much as I hate to say it may legitimately be classed as "funding terrorism".
Anti-Malware Response (Score:2)
Does anyone know how bad this might be from a computational-power standpoint?
Re:Anti-Malware Response (Score:5, Informative)
Uh, if 1024-bit RSA was broken, the world of encryption security would collapse (at least for the short term). Could it happen? Sure, it's possible. Will it happen in time to save your pr0n collection? Highly unlikely.
For one thing, compromise of RSA encryption would render SSL useless.
Re:Anti-Malware Response (Score:5, Informative)
1024-bit RSA is NOT considered secure anymore (Score:5, Informative)
As it was pointed out by another poster, no 1024-bit RSA is not sufficiently strong. Recent papers have demonstrated that factoring a 1024-bit key is now within practical reach. See for example this PhD dissertation from a student whose advisor was Shamir (the S in RSA FYI), which estimates that cracking a 1024-bit key would cost a few million US dollars [mit.edu].
Sure, at this point only a small number of organizations have a few million dollars to spare on cracking RSA, but this is beyond the point. The flaw is sufficiently serious that security standards are now recommending 2048-bit RSA keys minimum.
What I am talking about are relatively recent developments, it is not very well-known that 2048-bit is the minimum recommended length. This is why 1024-bit keys are still wildly used everywhere. My bank (www.wellsfargo.com) uses a 1024-bit key...
Re:1024-bit RSA is NOT considered secure anymore (Score:5, Informative)
This is a common mistake that non-cryptographers make. The above is true only for symmetric algorihtms. For asymmetric ones, like RSA, this is false. A 2001-bit RSA key is not twice harder to crack than a 2000-bit key. This is why for example the NIST recommendations list different key lengths depending on the type of crypto (sym vs. asym). For introductory-level material I suggest Cryptographic key length [wikipedia.org].
Re:Anti-Malware Response (Score:5, Informative)
this is why movie content will 'never' be immune to cracking. in the case of this virus, the decryptor is sent to you over the internet, if you pay the money, but having a good backup scheme also defeats the need to brute force. having a good security setup, should negate even the need for backups to prevent infection in the first place.
so always have a competent hardened firewall device like smoothwall express, never download attachments (webmail helps a lot in this arena, along with a secure browser, and a phishing aware user/browser add-on) avoid windows like the plague, but if you must run windows make sure it can only get access to the actual ports of the programs you actually use on it. and never run as administrator, unless you really genuinely need to do something that can't be done as a normal user.
trusting a 'commercial' 'hardware' router to protect a windows machine is insane, even if you've replaced the firmware with some variant of linux, it's Still Not hardened like smoothwall...
fine if you have all linux/bsd machines, but windows has as much security as the emperor had new clothes, even with a $$$ security suite. sad but true, only 0% of tested windows security software could stop 50/50 2006/2007 known rootkit/malware post install... the best was i think being able to remove 7/50 and 13/50, if it had actually gotten installed. specialized tools were also tested, not just suites.
the point being, if you must run windows remember that a piece of paper stands more chance of surviving a nuclear blast at point blank than windows has of being de-rooted without a format.
Re: (Score:3, Informative)
Re: (Score:2)
In the first key someone will most likely find the key in the virus code, in the second case it's BAD. Sure the NSA can break a 1024 RSA key if they have to, but I haven't heard of a "simple" commercial tool to do it.
Re: (Score:2)
I don't see why the laws governing the ability to break such a key would change for the NSA. A 1024 bit key is MUCH more than twice as hard to crack as a 660 bit key. Maybe someone can help me with the math? something like 2^(1024 - 660) times harder to crack?
Re: (Score:2)
Lookup Tables (Score:3, Interesting)
Now, I am not a cryptanalyst or mathematician, and I'm not clear on how RSA works, so bear with me. Suppose I were to generate a list of prime numbers. This only has to be done once. Now suppose I take each prime and multiply it by every other prime on the list. Now if ther
Re: (Score:2)
Wouldn't one person be able to pay of the extortion, and then give out the key to everyone else?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
LET'S HOPE SO (Score:5, Insightful)
The virus tossers are actually making their situation worse by turning to extortion. But they weren't all that bright to start with.
Re:LET'S HOPE SO (Score:5, Insightful)
Re: (Score:2, Informative)
Is this the future? (Score:5, Funny)
I don't know! Stop asking me those questions all the time. Is it obligatory to end every blurb with a question, or what?
Re: (Score:3, Funny)
They think they're pretty clever. (Score:5, Insightful)
The trust issue is that there is fundamentally no reason for the person receiving the money to follow through and send you the private keys to decrypt the data. If it was a known person, they'd be arrested, and since they're unknown there is no "reputational" factor that would make people more likely to pay based on the experience of others.
Just another moron criminal scheme from some douchebag who thinks he's found a get rich scheme. Just like other "genius" criminals, the fact is that the professionals in the field are smarter than the criminals.
This has been done before (Score:5, Informative)
Re:This has been done before (Score:5, Informative)
The Aids information disk:
http://www.jahewi.nl/malware/ransomware/ransomware.html [jahewi.nl]
Re:This has been done before (Score:5, Funny)
Re:This has been done before (Score:5, Informative)
http://news.bbc.co.uk/2/hi/technology/5038330.stm [bbc.co.uk]
The magic key is:
mf2lro8sw03ufvnsq034jfowr18f3cszc20vmw
Re:This has been done before (Score:5, Interesting)
Re:This has been done before (Score:5, Funny)
America On Line?
I glad (Score:2)
One can only hope.
Only an idiot doesn't backup. (Score:2)
Re: (Score:2)
What "modern file systems" are you talking about? Bundling rollback inside a filesystem is one of the stupidest things that could be done to fs. How many inodes would that eat up after a year, especially since some temporary files change hundreds times per day? Version control software and/or backups are designed for this purpose - and are filesystem agnostic (work with whatever fs suits your needs).
Personally I like the idea of such a virus, it could
Re: (Score:3, Informative)
Bundling rollback inside a filesystem is one of the stupidest things that could be done to fs.
Ok, you're right that the GP is stupid -- no filesystem a desktop user runs will have that transparent rollback. The closest might be "volume shadow copy", but I think that has to be done explicitly for every change you want to record.
But seriously, have you looked at FUSE lately? There's a filesystem for everything... And, historically, there are log-structured filesystems, which can, indeed, roll back any change that hasn't already been overwritten. That approach has nothing to do with inodes -- in fact,
All your dataz (Score:5, Funny)
Jack Hacker: How are you gentlemen? All your data are belong to us.
Gonna be ok (Score:5, Funny)
I'm sure the fine folks of our Government are watching everything that happens on my computer & will promptly decrypt my files for me using their built-in back doors.
I got infected by this virus (Score:5, Funny)
I know who is behind this scam.... (Score:2, Funny)
Of course I could be wrong.... but it's a thought
Bravo (Score:2)
I am however disappointed that the author used only 1024 bit key length, which is no longer recognized as unconditionally secure. Hopefully he or she at least generated a secure random seed for the key pair.
Cryptovirus (Score:2)
Still, the basic strategy remains viable, so the best opposing strategy would be to harden systems. Unix permissions won't help you here, since you usually have rights to write or alter permissions to stuff in your home directory. Backups would work (bu
Yeah, sure, *that'll* work.. (Score:5, Insightful)
"We have encrypted your illegally copied music files. Put $5000 in unmarked bills in a plain brown paper sack and mail it to: RIAA Washington, D.C. no later than midnight tonight or you'll never listen to your music again"
Can't wait for the criminal trials... (Score:2)
If they have a bagged copy of the virus (Score:2)
Major weak link--Yahoo.com e-mail address... (Score:2)
Unfortunately, 2 years from now, some poor soul will get bit by this... By then the Yahoo e-mail address will be long-dead, and the key might still be known only to the author...
data ransom != blackmail (Score:5, Informative)
Actually it's called Ransomware (Score:5, Informative)
The crypting your files and extort has been around since 1989 http://en.wikipedia.org/wiki/PC_Cyborg_Trojan [wikipedia.org]
No, the future is either... (Score:3, Informative)
...easy-to-use backups, and/or the government tracking down the payments and busting the guy who receives it.
Of course, if you are just backing up to the hard drive, the virus will make sure to trash your backups. Better back up to a non re-writeable CD. Most people's unique data isn't that large. If it is, you should be doing nightly offsite backups anyway.
old news - see Onehalf (Score:3, Interesting)
Anyone heard about Onehalf [wikipedia.org]? We're talking something like 1992-94 IIRC. :)
If my memory serves me right even further, the virus is from Kosice, Slovakia. It spread quite quickly (even though there was essentialy no Internet at that time in Slovakia) but later on, I believe ESET [eset.com] produced a utility to detect it and clean it up. Nice thing was, that it did not need to boot from clean boot floppy in order to do the clean-up (which was quite unussual at that time).
Funny thing then was, that few month later, as we though that Onehalf is - thanks to that utility - dead and old news, story came from USA that Onehalf reached there and that after a lot of trouble Norton was able to detect it. But not clean it. What a joke. If we've had email, we would happily mass-mail that ESET's anti-Onehalf utility to every one.
Maybe further info: ESET's One Half entry [www.eset.eu].
Re: (Score:3, Insightful)
And not as much as it would seem.
ps - this is why I have three copies of everything important to me and my wife, in two different locations, rarely more than 2 days out. She doesn't question me about this for a few weeks after she askes "Honey, I can't find........". She still doesn't understand about 12 years of email archives... Go figure.
Re: (Score:3, Informative)
So, the answer is yes, but only for a limited time. The number of shadow copies that can be kept is determined by the "free" space on the drive. On the other hand, there's usually at least seve