Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Virus Hold Computer Files 'Hostage' for $200 488

dwayner79 sent in a story about a new virus making the rounds- this one is unique because it locks your files and then demands a $200 ransom to get them back. It seems to me that this might leave some sort of tracable money trail. They don't have much information on any particular transmission mechanism, they just talk about web pages giving it up.
This discussion has been archived. No new comments can be posted.

Virus Hold Computer Files 'Hostage' for $200

Comments Filter:
  • I call hoax (Score:5, Interesting)

    by Short Circuit ( 52384 ) * <mikemol@gmail.com> on Tuesday May 24, 2005 @09:42AM (#12622731) Homepage Journal
    If it were real, we would have heard it from Symantec or McAffee long before a third-world news website.
  • Next time (Score:3, Interesting)

    by WormholeFiend ( 674934 ) on Tuesday May 24, 2005 @09:46AM (#12622785)
    Next time the police captures a virus writer, they should put him in a cell and tell him, we'll leave you here unless another virus writer pays us 200$.
  • Re:a fix (Score:3, Interesting)

    by wren337 ( 182018 ) on Tuesday May 24, 2005 @09:50AM (#12622832) Homepage
    Since they recovered the files without the key, it looks like the guy wrote his own crypto. Score one for the good guys. Next time maybe the guy uses a well written public key library. Encrypt the local files with a random symmetric key, encrypt the key with a public key and present it to the user. The user has to email the encrypted symmetric key to the virus writer for decryption.

    There's no reason to think there would be a single interceptable "key" value that would unlock everyone's files. It depends on the skill of the author.

  • Comment removed (Score:4, Interesting)

    by account_deleted ( 4530225 ) on Tuesday May 24, 2005 @09:58AM (#12622909)
    Comment removed based on user account deletion
  • I think... (Score:2, Interesting)

    by HTL2001 ( 836298 ) on Tuesday May 24, 2005 @09:59AM (#12622916)
    this is probably just an experiment, to see how many people are willing to pay this ammount to get the files back

    He (she?) would get more money if it was a lower ammount in an easy-to-pay system, since many more people would pay.
    Maybe we will see the story sometime soon
  • I remember them... (Score:3, Interesting)

    by aug24 ( 38229 ) on Tuesday May 24, 2005 @10:21AM (#12623116) Homepage
    I lost my third year project (Physics) to one in 1992. Eight months work chewed to bits, but a very nice chap named Jules reconstructed most of it from the actual sectors, with me guessing where-abouts it came from.

    Those were, emphatically, NOT the days.

    Justin.
  • Re:Crypto Question (Score:3, Interesting)

    by wren337 ( 182018 ) on Tuesday May 24, 2005 @10:24AM (#12623143) Homepage
    a chosen plaintext attack [wikipedia.org] might be an interesting defense. you could keep a series of chosen files with different extentions on your computer, so that when you get hit you have them for the decryption effort. Also you should wrap your monitor in tinfoil. ;)
  • by Bender0x7D1 ( 536254 ) on Tuesday May 24, 2005 @10:28AM (#12623191)
    Is to back up your data on a regular basis.

    This little bit of wisdom has been around since computers hit the home. Now if only people would follow the advice given to them this virus would be a complete non-issue. Instead, we have a bunch of users who are convinced nothing bad will happen to them, (or are completely oblivious to the dangers), complaining since they didn't do what someone told them it was important to do.

    I know I am paranoid, but I make sure important files are regularly copied to 3 different systems. Gmail makes a great place to store some of data - lots of space, geographically separated and administered by people who aren't complete idiots. I also copy my important stuff every week or two and put the disk in a fireproof safe designed for computer media.

    This scheme seems to work well against these sorts of viruses as well as natural disasters and harware failures.
  • by Errtu76 ( 776778 ) on Tuesday May 24, 2005 @10:37AM (#12623282) Journal
    back in the msdos days (aka: the good old days) there was a virus that locked your pc, did something nasty to your mbr (or fat - i forgot) and you had to play a game (or two .. or usually aLOT) on the slots machine. You would get your system back when you got the jackpot.
  • by Inkieminstrel ( 812132 ) on Tuesday May 24, 2005 @10:47AM (#12623385) Homepage
    Anyone else think this comment is funny in light of the signature attached to it?
  • Re:Finally! (Score:4, Interesting)

    by srleffler ( 721400 ) on Tuesday May 24, 2005 @10:50AM (#12623404)
    There was even at least one that could wipe the BIOS eproms, leaving the computer completely inoperable and difficult to repair if not outright irreparable.
  • by Anonymous Coward on Tuesday May 24, 2005 @10:58AM (#12623473)
    Will Microsoft start factoring these little occurances into the TCO of Windows?!
  • Re:Finally! (Score:3, Interesting)

    by imr ( 106517 ) on Tuesday May 24, 2005 @11:07AM (#12623565)
    It reminds me of DaHalf.
    This one was a perverse bastard. It slowly encrypted your hd track by track at every reboot but decrypted them, so the datas were perfectly safe as long as the virus was there.
    If you removed the virus, you lost the datas since the encryption key was in the virus.

    Do not remove virii before reading what they are about.
    If a virus is on your hd and you want to have it checked, cut the power, remove it from the pc and do not boot it until it is between the hands of a professional.
    Consider switching to linux and entering the land of peace of mind.
  • laundering the money (Score:5, Interesting)

    by goombah99 ( 560566 ) on Tuesday May 24, 2005 @11:18AM (#12623682)
    Everyone speculates that laundering the money will be hard. Perhaps not so hard really. This happens daily on E-bay with the western union scams. Apparentyl none of those are ever traced so why not these?

    As for tracing the e-mail well that wont work either: again people do this all the time on e-bay rip offs and none of those get traced.

    besides which the attacker might very well be logging your keystrokes and simply watching for you to send any text continaing a fake address he gave you, then sending this real text somewhere else. Fat chance you would notice this in time to do anything about it. He just picks off the western union number, then pays some street urchin to go collect for him.

    or you could rig this as sort of a two part thing. One is to have the virus encrypt the files. then "coincidentally" this spam e-mail comes offer to sell you a universal decoder program for the low price of 49.99$. THe company could be legitimate in the same sense that McAffee is legit. They just sell decryption tools. Sure they might be suspect but some company IS going to crack this and when they do they are going to SELL the decoder. The evil-doer merely has to be one of many companies offer this product for sale. It would be in his interest to leak the decoding method just so those decoy compamies would appear.

  • by tchernobog ( 752560 ) on Tuesday May 24, 2005 @11:38AM (#12623911)
    Not a really new idea, it's inside Andrew Tanenbaum's "Modern Operating Systems"!
    The virus programmer has to have read the book.
  • by saskboy ( 600063 ) on Tuesday May 24, 2005 @12:11PM (#12624267) Homepage Journal
    I encountered a virus just 2 years ago, although it had been written in the 1990s, that encrypted files on a hard drive using a randomly generated and locally stored key. If you removed the virus, you'd lose the key, and access to all files that had so far been encrypted. I don't recall the name of the virus right now, but I spent about an hour looking for a fix to this old virus, and fortunately found an old removal utility on a website that was still hosting it, and it retrieved the simple encryption key, and removed the virus after decrypting all of the encrypted files.
  • Re:Wow (Score:3, Interesting)

    by httptech ( 5553 ) on Tuesday May 24, 2005 @02:43PM (#12625965) Homepage
    Yep, I cringed when I saw it too. The other posters' comments about reporters is right on - you can talk for 15 minutes and give them a clear picture of the issue, but they'll pick the most impacting statements instead of the ones that explain it. And if you happen to say something that sounds fucktarded out-of-context, you can rest assured you'll see that quote in the article :)

    -Joe

    --
    Joe Stewart, GCIH
    Senior Security Researcher
    LURHQ http://www.lurhq.com/ [lurhq.com]
  • by Monkelectric ( 546685 ) <[moc.cirtceleknom] [ta] [todhsals]> on Tuesday May 24, 2005 @02:57PM (#12626144)
    Not sure if you're a troll or not, but us in the linux community don't want to *WIN THAT WAY*.
  • Amiga virus (Score:1, Interesting)

    by Anonymous Coward on Tuesday May 24, 2005 @04:45PM (#12627313)
    An Amiga virus which name I don't remember did me approximatelly this, to a floppy, like 15 years ago. The virus showed a message telling me to send the floppy to some postcard service. Although I never sent it (it was a backup of some game I owned), I guess that guy didn't have to buy his floppies anymore :-D.

Old programmers never die, they just hit account block limit.

Working...