Loading bridge
  • Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   New CryptoLocker Spreads via Removable Drives

New CryptoLocker Spreads via Removable Drives

  • Posted on:December 25, 2013 at 5:15 pm
  • Posted in:Malware
  • Author:
    Abigail Pichel (Technical Communications)
1

We recently came across a CryptoLocker variant that had one notable feature—it has propagation routines.

Analysis of the malware, detected as WORM_CRILOCK.A, shows that this malware can spread via removable drives. This update is considered significant because this routine was unheard of in other CRILOCK variants. The addition of propagation routines means that the malware can easily spread, unlike other known CRILOCK variants.

Aside from its propagation technique, the new malware bears numerous differences from known CryptoLocker variants. Rather than relying on a downloader malware—often UPATRE— to infect systems, this malware pretends to be an activator for various software such as Adobe Photoshop and Microsoft Office in peer-to-peer (P2P) file sharing sites. Uploading the malware in P2P sites allows bad guys to easily infect systems without the need to create (and send) spammed messages.

Further analysis of WORM_CRILOCK reveals that it has a stark difference compared to previous variants. The malware has foregone domain generation algorithm (DGA). Instead, its command-and-control (C&C) servers are hardcoded into the malware. Hardcoding the URLs makes it easier to detect and block the related malicious URLs. DGA, on the other hand, may allow cybercriminals to evade detection as it uses a large number of potential domains. This could mean that the malware is still in the process of being refined and improved upon. Thus, we can expect latter variants to have the DGA capability.

The differences between this particular CRILOCK variant and the others have led some researchers to believe that this malware is the product of a copycat. Regardless of its creator, WORM_CRILOCK.A shows that this could become the new favored attack method of cybercriminals.

Users should avoid using P2P sites to get copies of software. They should always download software from official and/or reputable sites. Given WORM_CRILOCK’s ability to spread via removable drives, users should also exercise caution when using flash drives and the like. Users should never connect their drives into unfamiliar or unknown machines. Our blog entry, Defending Against CryptoLocker, discusses at length additional ways of protecting a computer and a network against CryptoLocker malware.

Trend Micro uses AEGIS (behavior monitoring) to detect and block all threats related to this malware. For more information on ransomware’s background, you may visit this page. You may also refer to our FAQ page on Cryptolocker for a more comprehensive view about the malware.

With additional insights from Mark Manahan and Jimelle Monteser 





Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: cryptolockerMalwareransomwarewormWORM_CRILOCK

Featured Stories

  • Microsoft Patches IE/Edge Zero-day Used in AdGholas Malvertising Campaign
  • CVE-2016-6662 Advisory: Recent MySQL Code Execution/Privilege Escalation Zero-Day Vulnerability
  • BkSoD by Ransomware: HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs
  • The French Dark Net Is Looking for Grammar Police
  • Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems

Business Email Compromise

  • How can a sophisticated email scam cause more than $2.3 billion in damages to businesses around the world?
    See the numbers behind BEC

Latest Ransomware Posts

  • New Bizarro Sundown Exploit Kit Spreads Locky
  • The Last Key on The Ring – Server Solutions to Ransomware
  • Several Exploit Kits Now Deliver Cerber 4.0
  • How Stampado Ransomware Analysis Led To Yara Improvements
  • The Rise and Fall of Encryptor RaaS

Recent Posts

  • New Bizarro Sundown Exploit Kit Spreads Locky
  • Security Update Patches 13 Android Vulnerabilities Discovered by Trend Micro
  • CVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas Campaign
  • Masque Attack Abuses iOS’s Code Signing to Spoof Apps and Bypass Privacy Protection
  • Control Flow Guard Improvements in Windows 10 Anniversary Update

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • DressCode and its Potential Impact for Enterprises
  • Hacking Team Flash Zero-Day Integrated Into Exploit Kits
  • Several Exploit Kits Now Deliver Cerber 4.0
  • A Look at the BIND Vulnerability: CVE-2016-2776
  • FastPOS Updates in Time for the Retail Sale Season

Latest Tweets

  • New post: New Bizarro Sundown Exploit Kit Spreads Locky bit.ly/2eupLa1 @TrendMicro
    about 53 mins ago
  • CFG improvements make it hard for exploits to run code on #Windows 8.1 and 10. Details: bit.ly/2ey9G0Y
    about 3 hours ago
  • Minimal tech know-how + USD $20 = sniff #pager messages from tens of miles away. Our second pager research here:… twitter.com/i/web/status/7…
    about 9 hours ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.