Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Using Distributed Computing To Thwart Ransomware 361

I Don't Believe in Imaginary Property writes "The folks at Kaspersky labs are turning to distributed computing to factor the RSA key used by the GPcode virus to encrypt people's files and hold them for ransom. There are two 1024-bit RSA keys to break, which should require a network of about 15 million modern computers to spend a year per key factoring them. Unfortunately, there appear to be no vulnerabilities in the virus' use of RSA, unlike some previous cases. Perhaps more interestingly, there's some debate over whether people should bother cracking it. After all, what if they were trying to trick us into factoring the key for a root signing authority? Besides, there's a more direct method of breaking the encryption: track down the people who wrote the virus and force them to talk."
This discussion has been archived. No new comments can be posted.

Using Distributed Computing To Thwart Ransomware

Comments Filter:
  • That all depends ... (Score:2, Interesting)

    by El Cubano ( 631386 ) on Wednesday June 11, 2008 @11:08AM (#23748055)

    Besides, there's a more direct method of breaking the encryption: track down the people who wrote the virus and force them to talk.

    That depends on whether you think it is acceptable to compel someone to reveal something like that. If, as for example in the US, someone cannot be forced to incriminate himself, then he can just refuse and there is no further recourse. That is, if the only way of getting information out of someone is to ask them nicely for it.

  • by Opportunist ( 166417 ) on Wednesday June 11, 2008 @11:10AM (#23748107)
    The people who did that sit in a country ending in -stan. Countries ending in -stan have real problems and don't care for problems their citizens cause abroad.

    You can trust me on that one, I've tried. I've even had so much as the name of the person to prosecute. Nothing came out of it. Despite including our federal police and interpol.
  • 15 million CPU years (Score:4, Interesting)

    by robo_mojo ( 997193 ) on Wednesday June 11, 2008 @11:14AM (#23748175)
    15 million CPU years per key? And the attacker can just make up new keys as often as he likes. He could even make a different key for each target if he wanted.

    15 million CPU years is a lot to spend when you could just restore from backups.
  • by uab21 ( 951482 ) on Wednesday June 11, 2008 @11:16AM (#23748237)
    The screenshot at http://news.cnet.com/8301-10784_3-9965381-7.html?tag=nefd.top [cnet.com] says that the victim pays to download a 'decryptor'. Either the decryptor contacts, in real time, the extortionist (at a server location that can be linked to them), or the private key is included in the decryptor program, and should be able to be sussed out...
  • by Savior_on_a_Stick ( 971781 ) <robertfranz@gmail.com> on Wednesday June 11, 2008 @11:37AM (#23748577)
    Is it targeted manually, or is it a specifically directed attack? If it's out in the wild being spread [cough] virally, rather than being inserted into specific targets, then what happens when a mobster's double book accounting system gets infected. Some people have mentioned ruthless CEO's - but if this infected the wrong system, these folks could have someone after them with no restraint, deep pockets, and the resources and experience to root them out. Do I smell a TV movie in the offing?
  • Other way around (Score:5, Interesting)

    by DrYak ( 748999 ) on Wednesday June 11, 2008 @11:43AM (#23748669) Homepage

    Back in my youth, I never made regular backups.
    Then I got a virus.
    Since then, I make regular backups.
    Back in my childhood I did regular backups of my family's computer.
    Then we got a virus.
    Then we realized that the virus was a time bomb that was already present in dormant form even in the oldest several-months old backups.

    Sometimes you have parents that are both computer geeks, and they teach you the important of offline backups. Never the less, shit happens anyway.

  • by SatanicPuppy ( 611928 ) * <Satanicpuppy.gmail@com> on Wednesday June 11, 2008 @11:44AM (#23748693) Journal
    If we had a backup, wouldn't it be possible to break the encryption using the backed-up data as a crib? Why force the key directly when you know what is in a large chunk of the cyphertext?

  • by New_Age_Reform_Act ( 1256010 ) * on Wednesday June 11, 2008 @11:46AM (#23748753) Homepage Journal
    The article mentioned that despite the IP addresses of the email are from China, the fact is the people behind the GPcode campaign are Russian. That makes me wonder that how many computers in China has been turned into Russian zombies. That may well explain the reason why most attacks against U.S. Government networks are originated in China.
  • RC4 is easier... (Score:3, Interesting)

    by Panaflex ( 13191 ) <{moc.oohay} {ta} {ognidlaivivnoc}> on Wednesday June 11, 2008 @11:47AM (#23748773)
    Why waste time factoring RSA?? The RSA simply wraps an RC4 key.

    RC4 brute force is far easier. There are several known problems with RC4 which may possibly work to our advantage in cracking the data as well..
  • by DaedalusHKX ( 660194 ) on Wednesday June 11, 2008 @11:48AM (#23748793) Journal
    I think the bankers, the priests and the politicians have already figured out how to turn stupidity into free energy. Witness, for example, the boundlessly stupid as they sign up to fight politicians wars, religionists jihads, to man priests' inquisitions or run on the endless, profitless treadmill of the serf/employee rat race, and witness this set of examples through history. From tithes, to taxes, to "donations" to traffic tickets and drug enforcement, the boundlessly stupid have always eagerly jumped onto the bandwagon of the strong willed and obeyed without a single qualm, always finding quite creative and intelligent ways to justify what it was they were doing... usually via such imaginative excuses such as "just doing my job" or "its the law" or "the priests told me God said it, therefore it must be true" or perhaps "if the nice man on Tee Vee said it, how dare you question it?"

    Man's stupidity is already being harnessed... we're just too caught up in the minutia to notice it.
  • Re:1024 bits is big (Score:3, Interesting)

    by evanbd ( 210358 ) on Wednesday June 11, 2008 @12:01PM (#23749005)
    That would solve it in only 2^511 operations. In actuality, factoring of large numbers is far more efficient than that. The techniques are complex, but they're quite good. That's why a 1024 bit RSA key is considered somewhat small (2048 or 4096 are the norm) but for symmetric key ciphers (where you do have to try all 2^n possible keys) use key sizes of 256 bits or less.
  • by burris ( 122191 ) on Wednesday June 11, 2008 @12:22PM (#23749483)
    Actually, RSA is vulnerable to chosen plaintext. That is one of the reasons why a signature system encrypts the hash of the document instead of the document itself.

    In this case it is a randomly generated symmetric key that is encrypted so known plaintext won't help. I wonder if the white hats have looked closely at the key generation code. There is a good chance that there isn't much entropy in the keys and the keyspace can be narrowed down enough to make guessing the symmetric key feasible.
  • by jonwil ( 467024 ) on Wednesday June 11, 2008 @12:28PM (#23749605)
    It may sound bad but I actually WANT something like this to be created such that it will spread with the full force of Code Red, Nimda, Blaster, Storm and other massive attacks. 1000s of people and organizations worldwide (some of whom are important and/or have lost important data) would be hit and the world might actually start giving a stuff about computer security.
  • Re:RC4 is easier... (Score:3, Interesting)

    by burris ( 122191 ) on Wednesday June 11, 2008 @12:30PM (#23749635)
    Much more promising is the possibility of a lack of entropy in the key selection process. Without a lot of entropy and a good RNG, the size of the probable keyspace may be reduced dramatically. Enough that searching all probable keys may quite feasible, even trivial.
  • by Terrasque ( 796014 ) on Wednesday June 11, 2008 @12:38PM (#23749799) Homepage Journal
    it would be less work to give them a correct decryptor, than one that intentionally alters selective parts of a file. Correct decrypting will also give other people a reason to pay the ransom.

    So all in all, I think I can trust them to not intentionally do something like that, since that is in both parties' interest.
  • by ArsonSmith ( 13997 ) on Wednesday June 11, 2008 @01:46PM (#23751139) Journal
    So what exactly does a static strap do that just placing your hand on the frame not do? 20 years working with electronics and I've never seen a confirmed static destroyed equipment outside of manufacturing. A few anecdotes like yours, yes, but I've even tested by trying to destroy circuit boards with static. It is something that is extremely important in manufacturing prior to everything being mounted and grounded, not so much afterward.
  • Re:Data recovery (Score:2, Interesting)

    by sempernoctis ( 1229258 ) on Wednesday June 11, 2008 @01:57PM (#23751369)
    The encrypted version most likely overwrote the plaintext version in-place, but I suppose it is possible there are plaintext fragments still floating about...according to what I've heard about forensics, you might have a chance if you take your hard drive platters out and borrow the nearest electron microscope to examine them :)
  • by zullnero ( 833754 ) on Wednesday June 11, 2008 @02:09PM (#23751671) Homepage
    You seem to forget that Windows isn't cheap at all. Have you ever purchased a site license?

    The real people against the wall are lazy Windows admins, or companies that understaff their IT department (or hire idiots with little formal education or experience on the dime). No one will ever take out insurance against this stuff, and if someone tries to sell it, they may well be the scum behind the ransomware to begin with. What companies will do is force all their IT people to get MS certs, because managers and execs do exactly what Microsoft tells them to do. Microsoft tells you to pay ungodly amounts for certifications, that's what they do.
  • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Wednesday June 11, 2008 @02:21PM (#23751917) Journal
    Reminds me of a story. It's a classic inspirational story, of a storm that washes up a bunch of starfish -- or maybe they're seahorses, or jellyfish, depending on who's telling the story. So there's all these starfish dying on the beach... A kid is walking along the beach, picking them up, one by one, and tossing them back into the ocean. A man watches him do this, and after awhile, walks up and says "You know you're not going to make a difference, right?"

    The kid picks up another starfish, tosses it into the ocean... "I just did to that one."

    Yes, it'd very quickly become pointless in that next time, they'd use a 2048-bit or 4096-bit key, and they'd change it more often. But for the people who've lost data to this thing already, it's never futile if this can get it back.

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...