Sneaky Blackmailing Virus That Encrypts Data 409
BaCa writes "Kaspersky Lab found a new variant of Gpcode which encrypts files with various extensions using an RSA encryption algorithm with a 1024-bit key. After Gpcode.ak encrypts files on the victim machine, it changes the extension of these files to ._CRYPT and places a text file named !_READ_ME_!.txt in the same folder. In the text file the criminal tells the victims that the file has been encrypted and offers to sell them a decryptor. Is this a look into the future where the majority of malware will function based on extortion?"
Re:Anti-Malware Response (Score:5, Informative)
Uh, if 1024-bit RSA was broken, the world of encryption security would collapse (at least for the short term). Could it happen? Sure, it's possible. Will it happen in time to save your pr0n collection? Highly unlikely.
For one thing, compromise of RSA encryption would render SSL useless.
This has been done before (Score:5, Informative)
Re:LET'S HOPE SO (Score:2, Informative)
Re:This has been done before (Score:5, Informative)
The Aids information disk:
http://www.jahewi.nl/malware/ransomware/ransomware.html [jahewi.nl]
Re:But were they smart, or stupid? (Score:3, Informative)
Does it matter? I have backups.
Really, this doesn't scare me very much. Can these people stop making money on spam, please, and let them try their hand at blackmail? Because it's fine-- a lot of people won't pay, and others will get the FBI to trace the money to the criminals behind it. They'll probably get caught, but either way they won't get me. Like any sane person, I have a firewall, don't open random attachments, and keep backups.
Re:This has been done before (Score:5, Informative)
http://news.bbc.co.uk/2/hi/technology/5038330.stm [bbc.co.uk]
The magic key is:
mf2lro8sw03ufvnsq034jfowr18f3cszc20vmw
Re:But were they smart, or stupid? (Score:4, Informative)
Unless you have space for infinite backups, his method is write. At some point, you'll run out of space and have to delete old backups to make room for the new ones.
Re:Anti-Malware Response (Score:5, Informative)
Re:But were they smart, or stupid? (Score:5, Informative)
try 'never i use 1 time recordable optical media'
i realize some people use 'rewritable' media for backups, and have this 'roll over' issue, but the only part of my backup that does rollover is the redundant external HDD for 'critical' data that i don't trust entirely to a DVD media, even is i only buy grade 1 media...
I don't have a small data set either, I have over 1 TB of stuff on optical discs, but surprisingly only about 30 gigs that is important enough to go to a redundant hdd.
Re:This is why backups are good (Score:2, Informative)
Also, this is one of the benefits of a journaling filesystem (or in OSX, "Time Machine"), among other things. Roll it back, and *poof* - no more encrypted files.
Re:But were they smart, or stupid? (Score:5, Informative)
And given that most people work in files which are essentially text or the moral equivalent (Word docs, etc), it's likely that you do, in fact, have enough space for a very, very large number of backups.
Re:But were they smart, or stupid? (Score:3, Informative)
I don't know about most people, but my backups bear a strong resemblance to a versioned filesystem: it doesn't matter if the encrypted files wind up on the backup, because I can always roll back to a version before they were encrypted.
data ransom != blackmail (Score:5, Informative)
Re:Only an idiot doesn't backup. (Score:3, Informative)
But seriously, have you looked at FUSE lately? There's a filesystem for everything... And, historically, there are log-structured filesystems, which can, indeed, roll back any change that hasn't already been overwritten. That approach has nothing to do with inodes -- in fact, not all filesystems even have inodes.
A little knowledge is a dangerous thing.
Re:Anti-Malware Response (Score:5, Informative)
this is why movie content will 'never' be immune to cracking. in the case of this virus, the decryptor is sent to you over the internet, if you pay the money, but having a good backup scheme also defeats the need to brute force. having a good security setup, should negate even the need for backups to prevent infection in the first place.
so always have a competent hardened firewall device like smoothwall express, never download attachments (webmail helps a lot in this arena, along with a secure browser, and a phishing aware user/browser add-on) avoid windows like the plague, but if you must run windows make sure it can only get access to the actual ports of the programs you actually use on it. and never run as administrator, unless you really genuinely need to do something that can't be done as a normal user.
trusting a 'commercial' 'hardware' router to protect a windows machine is insane, even if you've replaced the firmware with some variant of linux, it's Still Not hardened like smoothwall...
fine if you have all linux/bsd machines, but windows has as much security as the emperor had new clothes, even with a $$$ security suite. sad but true, only 0% of tested windows security software could stop 50/50 2006/2007 known rootkit/malware post install... the best was i think being able to remove 7/50 and 13/50, if it had actually gotten installed. specialized tools were also tested, not just suites.
the point being, if you must run windows remember that a piece of paper stands more chance of surviving a nuclear blast at point blank than windows has of being de-rooted without a format.
Re:But were they smart, or stupid? (Score:5, Informative)
Actually it's called Ransomware (Score:5, Informative)
The crypting your files and extort has been around since 1989 http://en.wikipedia.org/wiki/PC_Cyborg_Trojan [wikipedia.org]
Re:But were they smart, or stupid? (Score:5, Informative)
You are asked to send money through Western Union or some other provider that doesn't check your ID for amounts smaller than a few thousand USD. Then they send some bum to one of the thousand WD offices, somewhere on this planet, with the withdrawal code. And only once they get your money, you get your decryption key.
So, now you know where the money ends up, and why police can't do jack about it.
1024-bit RSA is NOT considered secure anymore (Score:5, Informative)
As it was pointed out by another poster, no 1024-bit RSA is not sufficiently strong. Recent papers have demonstrated that factoring a 1024-bit key is now within practical reach. See for example this PhD dissertation from a student whose advisor was Shamir (the S in RSA FYI), which estimates that cracking a 1024-bit key would cost a few million US dollars [mit.edu].
Sure, at this point only a small number of organizations have a few million dollars to spare on cracking RSA, but this is beyond the point. The flaw is sufficiently serious that security standards are now recommending 2048-bit RSA keys minimum.
What I am talking about are relatively recent developments, it is not very well-known that 2048-bit is the minimum recommended length. This is why 1024-bit keys are still wildly used everywhere. My bank (www.wellsfargo.com) uses a 1024-bit key...
Re:But were they smart, or stupid? (Score:5, Informative)
"And only once they get your money, you don't get your decryption key."
There, fixed that for you. :-)
Re:But were they smart, or stupid? (Score:5, Informative)
Re:Anti-Malware Response (Score:3, Informative)
Oh please! We all know there aren't any REAL banks (Score:5, Informative)
in Nigeria?
There are real banks in Nigeria, owned by the ruling ethnic group, that's where the billions of dollars from oil goes. The rulers get their money while those who live where the oil comes from, the Niger Delta [realclearpolitics.com], have to fight for scraps.
FalconRe:But were they smart, or stupid? (Score:4, Informative)
For that matter, these are also things which don't change a lot. They shouldn't take up too much space in the backup, if you're using even a halfway-intelligent backup program -- both of the ones you mentioned at least do hardlinks.
The real danger here would be if the program actually corrupted the entire backup repository. For that to happen, it would have to know when your backup hard drive was plugged in -- and there are other ways of avoiding this, such as running backups over a network to a server with limited access.
Re:All your dataz (Score:1, Informative)
Jack Hacker: How are you gentlemen? All your data are belong to us.
Corporate Linux users generally *do* pay (Score:3, Informative)
Re:1024-bit RSA is NOT considered secure anymore (Score:5, Informative)
This is a common mistake that non-cryptographers make. The above is true only for symmetric algorihtms. For asymmetric ones, like RSA, this is false. A 2001-bit RSA key is not twice harder to crack than a 2000-bit key. This is why for example the NIST recommendations list different key lengths depending on the type of crypto (sym vs. asym). For introductory-level material I suggest Cryptographic key length [wikipedia.org].
Re:Corporate Linux users generally *do* pay (Score:3, Informative)
RedHat and Novell have anted up to the table and can offer Linux desktops and servers in an industry that pretty much was Windows only, other than maybe a Solaris or AIX box here and there. Part of what people pay for when purchasing commercial support for RHCE or SUSE is the cost of this.
OBMac: MacOS 10 too has recently gotten FIPS certified, so that is another UNIX that is usable on the desktop where the certificates are needed for due diligence.
RedHat is great on servers, should something need changed, I can load the SRPM, make in-house source code changes, then have those stored separately from the original source so it can be documented come audit time what was changed in some program that needed customization on that level. To boot, with the binary RPM, all it takes is one simple command to push the change out to relevant machines via ssh and have those boxes install it.
No, the future is either... (Score:3, Informative)
...easy-to-use backups, and/or the government tracking down the payments and busting the guy who receives it.
Of course, if you are just backing up to the hard drive, the virus will make sure to trash your backups. Better back up to a non re-writeable CD. Most people's unique data isn't that large. If it is, you should be doing nightly offsite backups anyway.
Re:Vista solution? (Score:3, Informative)
So, the answer is yes, but only for a limited time. The number of shadow copies that can be kept is determined by the "free" space on the drive. On the other hand, there's usually at least several revisions there, so if the folder isn't changed often you can probably find the old version. If the folder IS changed frequently, you'd probably notice right away.
I say folder because if a file's name is changed (or a file is deleted), you need to recover it by going to the folder's shadow copy and restoring from there (you can restore the whole folder, but can also extract individual files). You can also rename the file and check for shadow copies under its original name.
Finally, don't forget that the shadow copies can be deleted. It takes more than normal permissions - I don't think even normal Administrators can delete them directly, though if you have Administrator it's easy enough to get System - which means you would need to have approved a UAC prompt somewhere - but that's true of most software installation. That said, the actual attack (encrypting personal files) requires no special permissions at all - it would work even on a properly locked-down Linux or OS X box. IE under Protected Mode wouldn't have sufficient permissions, however.
Re:But were they smart, or stupid? (Score:3, Informative)
OS X is reasonably secure, but so is Linux. And while harder, Windows can also be made that way. Just because your Mac hasn't been pwned yet doesn't mean that it won't. The only secure OS is one that doesn't do anything.
Macs are actually 24 years old, and there were Mac OS viruses out there. The hardware features of automagically reading a floppy inserted into the drive made the spread of those viruses much more easy.
Sheldon
Re:But were they smart, or stupid? (Score:3, Informative)