Using Distributed Computing To Thwart Ransomware 361
I Don't Believe in Imaginary Property writes "The folks at Kaspersky labs are turning to distributed computing to factor the RSA key used by the GPcode virus to encrypt people's files and hold them for ransom. There are two 1024-bit RSA keys to break, which should require a network of about 15 million modern computers to spend a year per key factoring them. Unfortunately, there appear to be no vulnerabilities in the virus' use of RSA, unlike some previous cases. Perhaps more interestingly, there's some debate over whether people should bother cracking it. After all, what if they were trying to trick us into factoring the key for a root signing authority? Besides, there's a more direct method of breaking the encryption: track down the people who wrote the virus and force them to talk."
Seems rather futile.. (Score:5, Insightful)
Re:Seems rather futile.. (Score:5, Insightful)
Hacker - You must pay me $100 or your files will be forever encrypted by my nigh-unbreakable RSA code.
User - Meh, I just wiped my system of your virus and restored my important files from back-up. Piss off.
Layne
Re:Seems rather futile.. (Score:5, Informative)
Re:Seems rather futile.. (Score:5, Insightful)
Re:Seems rather futile.. (Score:4, Insightful)
Time Machine on MacOS seems to be just about there, all they need to do is bundle an external HDD or offer a free online component for personal docs.
Re:Most Likely to Not Use it and to Pay. (Score:4, Funny)
Enterprise-level backup apps are almost always 3rd-party, not "some kind of unreliable M$ thing". Any serious solution also has a means to restore to bare metal, so in effect you need no OS at all to do this.
(and when was the last time anybody kept any current work on a floppy? Cripes - 1992 called and they want their backup devices back).
Re: (Score:3, Insightful)
Back in my youth, I never made regular backups.
Then I got a virus.
Since then, I make regular backups.
As annoying as it seems, sometimes people need to understand first-hand the need for regular, offline backups. Until they have the experience of data-loss, they just won't appreciate what could happen.
Other way around (Score:5, Interesting)
Then I got a virus.
Since then, I make regular backups.
Then we got a virus.
Then we realized that the virus was a time bomb that was already present in dormant form even in the oldest several-months old backups.
Sometimes you have parents that are both computer geeks, and they teach you the important of offline backups. Never the less, shit happens anyway.
Re: (Score:3, Interesting)
Re: (Score:3, Insightful)
Re: (Score:2, Insightful)
As for it being a trick to crack a root signing key, would they not have to have the private key to encrypt with to start?
Re:Seems rather futile.. (Score:5, Informative)
As for it being a trick to crack a root signing key, would they not have to have the private key to encrypt with to start?
It works like this:
1. Virus generates a random encryption key and encrypts your data with it. Let's call this K.
2. Virus encrypts the random key with a RSA public key and instructs you to email that, R(K), and your money, to the ransomers.
3. The ransomers use their RSA private key to decrypt the encrypted random encryption key, R(K), into K.
4. You use the random encryption key they sold back to you, K, to rescue your data.
Someone else's decryption key, K', is not useful to you because your data was encrypted with a different random key K. You have an RSA-encrypted copy of your own random key, R(K), because that's what the ransomers need you to send them so they can sell you the decryption key K. We're trying to crack the RSA private key so we can generate K from R(K) without having to pay them money, i.e. sidestep step 3.
Re:Seems rather futile.. (Score:5, Funny)
Re: (Score:2)
Surely all you have to do is make frequent back-ups of your critical data and the virus becomes pointless.
While keeping backups regularly is something we must do, I'd like to add that surely all you have to do is install an Operating System with decent security (such as GNU/Linux) and all the viruses become pointless.
My dad is still using Windows. His application icons have some desktop below them - pardon, i meant to say that his desktop is filled with application icons, all installed by third party applications (which I don't know are virus-free, but most of them have a GPL equivalent in GNU/Linux), he's rei
Re:Seems rather futile.. (Score:4, Insightful)
Re: (Score:2)
Re: (Score:3, Interesting)
The kid picks up another starfish, tosses it into th
I've got a better idea (Score:5, Insightful)
Re: (Score:2)
Re:I've got a better idea (Score:5, Funny)
Re: (Score:2)
Re:I've got a better idea (Score:4, Funny)
Re:I've got a better idea (Score:5, Funny)
Re: (Score:3, Funny)
Re:I've got a better idea (Score:5, Funny)
> Psh... backups? I restore my data from a parallel universe, where I didn't get hit by a virus in the first place.
K dkd that, but kt turns out they use a slkghtly dkfferent alphabet kn that unkverse.
Re: (Score:2)
NASA, is that you ? (Score:2)
Don't forget the corollary. (Score:5, Insightful)
Encourage the application writers to make their applications EASY TO BACKUP.
The problem I keep seeing is that TELLING someone to back up their data is easy to do. FINDING ALL of the data is just about impossible.
You'll never know if you got it all until AFTER a problem.
Or even
Re: (Score:2)
> The problem I keep seeing is that TELLING someone to back up their data is easy to do. FINDING ALL of the data is just about impossible.
It drives me crazy that it is nearly impossible to back up applications under Windows.
I want to back up a directory tree and know that I can reinstall that appliction by restoring that backup.
But under Windows, the application consists of files in the applications 'Program Files' directory
There is a LITTLE magic involved. (Score:4, Informative)
For the Registry, you can "export" the entries for that app to a file and, later, you can import that file into the Registry.
The problem with the Registry is the same as you've noted with the file system. Stuff gets put EVERYWHERE. And there is no way to KNOW that you have EVERYTHING until AFTER you attempt to restore it. AND that doesn't include anything "updated" when you get a patch or point-zero-one release "upgrade".
Now, the installer can put that stuff everywhere
And I don't want to hear that that is to prevent "piracy". Just encrypt the stuff with the unlocking key or whatever. That way I can keep a TEXT file of app-name -- key code on my USB drive along with the backups.
Re:Don't forget the corollary. (Score:4, Insightful)
Not quite a direct answer, but you might want to consider using mostly "Portable" [portableapps.com] apps (that site has tons of them, but by no means counts as the only source... And of course, better-designed programs work portably without needing a wrapper).
They have nothing to do with Linux or FOSS (though they do tend to exist as FOSS and have Linux versions available). You copy the program's directory (and, if you changed it, your data directory) to a new machine, and bam, it just works. No installation, no annoying migration tools that fail half the time, no custom compression schemes that only worked back on version 4.8 but they stopped supporting in 5.0 and no longer sell version 4.8, etc.
With most of them, you can run them from USB thumb-drives (the original meaning in this context of "portable" - Literally, you can take them with you); With many, you can even run them from read-only media such as a CD (though obviously you can't save your data in the same place when doing so).
Re: (Score:2)
Re:I've got a better idea (Score:4, Interesting)
Re:I've got a better idea (Score:4, Informative)
Re:I've got a better idea (Score:5, Informative)
Re:I've got a better idea (Score:5, Funny)
Way ahead of you. I went into IT security years ago. It is a gold mine. You can basically sell snakeoil and people will kill each other to buy it from you.
Re: (Score:2)
Oh crap, the TSA beat me to it!! Dammit!
P.T. Barnum was right on his analyses of the sucker... "one born every minute and two to take care of him," and "nobody ever went broke betting on human stupidity."
Re:I've got a better idea (Score:4, Funny)
Re: (Score:3, Funny)
It will be absolutely nothing more than a box filled with paperwork. After filling out said paperwork, the client is guaranteed paper "rights" to be "free" and "protected" with said freedoms and protections guaranteed by the pieces of paper, and through no action or knowledge of his own. The client thus receives all the benefits without any of the actual ri
Re: (Score:2)
Re: (Score:3, Interesting)
Re:I've got a better idea (Score:5, Insightful)
Banking, religion, and politics all have their problems, no doubt. But they're all important and persistent factors in the progress that humanity has made. They've all been involved in bad things, but they've all be involved in lots of good things as well.
A human being is, on their own, capable of many things, both good and bad. Structures, systems, corporations, religions, corporations...they've all allowed us as a civilization to accomplish tasks that no one man could accomplish on his own. Some good and some bad, but all it does is amplify our abilities.
Re: (Score:3, Insightful)
Joking aside, however, just because progress has benefitted certain people, does not make their willing and unwilling pawns any more intelligent, or wise, or smart, or anything but what they are. Just because progress can be achieved with 99% enslaved labor, does not mean it cannot be done equally as well (if not better) by those who participate by mutual agreement.
To pu
Re: (Score:3, Insightful)
I recall a similar study where they asked students across the 50 states to rate their "self-esteem" in regards to mathematics - how confident they were in handling numbers, and how good they thought they were.
Students' self-esteem correlates negatively with test scores. I guess humility is learned through... learning.
Re: (Score:2)
But since we can't really trust the average Joe to take preventive measures such as safe browsing, or using antivirus and firewalls, I'm not too convinced that your idea is gonna be as popular as one may expect...
I find this to be the case. Questions like
"Why can't I install software on this machine?"
"Why do I need a different login to surf the web?"
"Why is the computer so slow at 3:30 a.m.?"
Even after explaining rights/permissions and how to keep from giving the wrong ones to malicious websites, I still get those questions. After explaining that protection/scanning software is running while you are supposed to be asleep and that is why it's slow at 3:30 a.m. I still get the c
track down the people who wrote the virus and for (Score:4, Funny)
Interbank Data Recovery Services (Score:5, Funny)
Fortunately, we had Interbank Data Recovery Services. And Interbank does more than just acquire the decryption key.
That's because Interbank vows to find out who sent you the ransom and hunt them down like animals. Like filthy, dirty animals. That's the Interbank difference. See, I don't care how Interbank's secret police get things done. I just care that they get things done. For us.
Plus, because we'd enrolled in their Premiere Membership program, Interbank also hunted down friends and relatives of the guy who had encrypted our data, dragged them from their beds in the middle of the night, and set fire to their homes.
Re: (Score:3, Funny)
recuperating (Score:2)
Recovering from post traumatic stress disorder, a number of wounds, and radiation poisoning.
Damn it (Score:4, Funny)
If only I hadn't erased Jack Bauer's cell from my contact list after the last season...
Re: (Score:3, Funny)
If only I hadn't erased Jack Bauer's cell from my contact list after the last season...
Backup (Score:2)
That all depends ... (Score:2, Interesting)
Besides, there's a more direct method of breaking the encryption: track down the people who wrote the virus and force them to talk.
That depends on whether you think it is acceptable to compel someone to reveal something like that. If, as for example in the US, someone cannot be forced to incriminate himself, then he can just refuse and there is no further recourse. That is, if the only way of getting information out of someone is to ask them nicely for it.
Re: (Score:2, Funny)
Re: (Score:2)
My personal opinion is that these guys have a bullet with their name on it, its just a matter of time before stuff like this starts getting people killed on a regular basis. If the governments are not powerful enough or unwilling to tackle such criminal issues...one
Re: (Score:2)
There is no recourse right now in the current criminal justice system for crimes of this nature.
Really? In the UK there's things like the Computer Misuse Act, and since the scammer has accessed a computer without permission (with the virus) he's clearly breaking the law. A UK citizen was extradited to the USA last year for hacking a government computer, I think you have the laws.
I have zero problems with the CIA going and finding homes for bullets in Russian spammers or Nigerian scammers or any other criminals who attack US citizens from outside the US.
And you trust the CIA to do it right? Ha!
Re: (Score:2)
Western "laws" dont extend to most of the world, and yet just about every square foot of this Earth can receive internet access without all that much trouble. I could probably set up a wifi hotspot just about anywhere in Namibia for under $3000 USD. But that's nothing because these idiots made 20 grand in the fir
Re: (Score:2)
If the guy isn't willing to let hundreds of people have their data back then throw the book at him, if he's at very least decent enough to give it up then cut his sentence a fair bit.
Re: (Score:2)
Re: (Score:3, Funny)
Oh, I do: as long as it's not the government doing the compelling.
Just once it'd be fun to hear that the local mafia don's PC got infected because his wife wanted cute smileys, and that the local prosecutor is frustrated by the lack of direct evidence linking the don to what they found down by the river.
Make them talk? (Score:3, Funny)
Re:Make them talk? (Score:5, Funny)
Talk about motivation!
Re: (Score:3, Funny)
But you have some really odd fetishes, I gotta tell ya that.
Re: (Score:2)
Tag: Goodluckwiththat (Score:5, Interesting)
You can trust me on that one, I've tried. I've even had so much as the name of the person to prosecute. Nothing came out of it. Despite including our federal police and interpol.
Re:Tag: Goodluckwiththat (Score:4, Informative)
Force them to talk? (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
15 million modern computers?? (Score:4, Insightful)
Lets put some Iraqis to work on this. (Score:2)
Surely they could be employed to
15 million CPU years (Score:4, Interesting)
15 million CPU years is a lot to spend when you could just restore from backups.
1024 bits is big (Score:2, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
It is a good devlopment, Don't help them (Score:5, Insightful)
As long as security is valued at zero dollars when the IT bean counters are evaluating platforms and vendors crapware will proliferate.
Re: (Score:3, Interesting)
The real people against the wall are lazy Windows admins, or companies that understaff their IT department (or hire idiots with little formal education or experience on the dime). No one will ever take out insurance against this stuff, and if someone tries to sell it, they may well be the scum behind the ransomware to begin with. What companies will do is force all their IT people to get MS certs, because manage
Re: (Score:3, Insightful)
Got to be a link to the extortionist (Score:4, Interesting)
Re:Got to be a link to the extortionist (Score:4, Informative)
Re:Got to be a link to the extortionist (Score:4, Insightful)
1. Encrypt victim's data with random AES key
2. Store key in body of a PGP message for yourself
3. Get victim to send you the PGP message
3. Decrypt PGP message using private PGP key, find AES key
4. Send AES key to victim - for a price...
Seriously, this could probably be hacked together in the matter of a few hours if explained to someone knowledgable. The private key never leaves the bad guys. And if they decide the heat is on and torch the operation and set it up elsewhere you're 100% screwed. Trying to crack this must be the most useless operation ever, they could easily make the keys stronger and thousands of years would pass to crack it. In one word: Nasty.
Re: (Score:2)
The screenshot at http://news.cnet.com/8301-10784_3-9965381-7.html?tag=nefd.top [cnet.com] says that the victim pays to download a 'decryptor'. Either the decryptor contacts, in real time, the extortionist (at a server location that can be linked to them), or the private key is included in the decryptor program, and should be able to be sussed out...
In which case, setup a sting operation and pay for one. Me, I have no intention of lending my CPU to crack keys for someone who didn't make backups.
Leave it be. (Score:3, Insightful)
So, there are two possibilities here:
Either way, this seems like a pretty strong (if harsh) lesson for end users. If #1, use better software, like your geek friends have been telling you this for years. That doesn't have to mean installing Ubuntu; it could just mean upgrading from IE6 to Firefox (or IE7), or from Outlook Express to Thunderbird (or Gmail). If #2, then haven't you been told about 1,000 times not to do that? Now do you see why?
I truly feel bad for people who get nailed for this, in almost exactly the same way I feel bad for my kids when they touch the stove after I've told them it was hot.
Let me get this straight (Score:2)
I assume the folks at Kaspersky labs know what they are doing, but known data? Even if we get several samples of known data and compare it to it's encrypted counterpart, it takes 15 million computers?
I mean Colossus only had suspected known data, such as, "Nothing to report" and broke the enigma code. That's impressive!
Re: (Score:2)
For example, do you think your SSH password is encrypted the same way every time it crosses the wire? No.
Re: (Score:3, Interesting)
In this case it is a randomly generated symmetric key that is encrypted so known plaintext won't help. I wonder if the white hats have looked closely at the key generation code. There is a good chance that there isn't much entropy in the keys and the keyspace can be narrowed down enough to make guessing the symmetric key feasible.
Re: (Score:2, Informative)
Data recovery (Score:5, Insightful)
Someone try to undelete the files with a disk recovery tool and see what you get. Just because the file is encrypted does not mean that the original was correctly destroyed.
No trust, ergo, no reason to decrypt (Score:4, Insightful)
I suppose if the file in question was something like a manuscript for a novel, where the owner can more or less verify it by eye, and (importantly) there isn't that much downside if our opponent sneaks some changes in, that might be worthwhile. But in general...
Make another virus (Score:2, Funny)
2. Encrypt his/her data with a similar algorithm plus a key logger.
3. The keylogger phones home with the key the perpetrator used to decrypt his/her data.
4. Profit!
Talking (Score:2)
How does this malware propogate? (Score:2, Interesting)
Re: (Score:3, Interesting)
RC4 is easier... (Score:3, Interesting)
RC4 brute force is far easier. There are several known problems with RC4 which may possibly work to our advantage in cracking the data as well..
Re: (Score:3, Interesting)
I'm all for forcing them to talk (Score:3, Insightful)
Re: (Score:2)
Oh, wait...
Re: (Score:3, Funny)
You should probably get the private key from them first.
Re: (Score:2)
No. Plaintext isn't xor'ed with the key itself, but with a stream of data created using the key as one of the inputs. Similarly, I only have one GPG encryption key, but good luck reverse engineering it even given known plaintext.
Re: (Score:2)