Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

Probably oldhat to you, malware demanding instant ransom.

This is the place for general discussions - we are a family site - no bad language, no flames.
A Moderators word is final.

Probably oldhat to you, malware demanding instant ransom.

Unread postby fleamailman » March 16th, 2006, 9:05 pm

WASHINGTON (AFP) - In the equivalent of a holdup in cyberspace, a new computer bug locks up a user's file with encryption and demands a 300-dollar "ransom," security experts say.

The so-called "ransomware" Trojan was discovered Saturday by the security firm LURHQ, which said it was based on a similar scheme perpetrated 15 years ago.

Users whose computers are infected receive an e-mail stating that their files have been encrypted and will not be unlocked unless they transfer 300 dollars to a special account.

In poorly written English, the message said, "Do not try to search for a program what encrypted your information -- it simply do not exists in your hard disk anymore. If you really care about documents and information in encrypted files, you can pay using electronic currency 300 dollars. Reporting to police about a case will not help you."

LURHQ said it was not clear how the Trojan was spread, but experts said it could be through infected e-mails or from visiting certain websites.

"Infection reports are not widespread, so it is not believed this is a mass threat by any means," LURHQ said.

"Malware of this nature is actually more successful when it is delivered in low volumes, as it is less likely that anti-virus vendors will have detection for it, and more attention means the likely closing of the accounts used for the anonymous money transfer."

The Trojan "is bold as brass, scooping up your valuable data and locking it away until you agree to pay the ransom to the criminals who have 'kidnapped' your files." said Graham Cluley, senior technology consultant for the security firm Sophos.

"Companies who have made regular backups may be able to recover easily, but less diligent businesses may be in a quandary about whether to cough up the cash."

However Sophos and LURHQ discovered the password -- C:/Program Files/Microsoft Visual Studio/VC98 -- a code disguised as a file.

"So there should be no need for anyone unfortunate enough to have suffered from this ransomware attack to have to pay the reward to the criminals behind it," Cluley said.
User avatar
fleamailman
Banned Member
 
Posts: 171
Joined: October 28th, 2005, 6:32 pm
Location: geneva
Advertisement
Register to Remove

Unread postby Nick-YF19 » March 31st, 2006, 5:12 am

Bump to remove from zero reply search.
User avatar
Nick-YF19
Admin/Teacher Emeritus
 
Posts: 4036
Joined: May 17th, 2005, 12:42 am
Location: California

Unread postby rav009 » April 7th, 2006, 8:00 am

:shock: :shock: :shock:
rav009
Regular Member
 
Posts: 69
Joined: March 29th, 2006, 2:52 am


Return to General Discussions



Who is online

Users browsing this forum: No registered users and 59 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware