{"id":245362,"date":"2010-01-29T06:00:00","date_gmt":"2010-01-29T11:00:00","guid":{"rendered":"tag:redtape.msnbc.com:\/\/8be91dbc36c68889b9fb3a955355457a"},"modified":"2010-01-29T06:00:00","modified_gmt":"2010-01-29T11:00:00","slug":"give-me-your-money-or-your-computer-gets-it","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/245362","title":{"rendered":"Give me your money, or your computer gets it"},"content":{"rendered":"<p><font face=\"Verdana\"><a href=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a81fb7d3970b-pi\" style=\"DISPLAY: inline\"><img decoding=\"async\" alt=\"Rogue\" border=\"0\" class=\"asset asset-image at-xid-6a00d83451b0aa69e20120a81fb7d3970b \" src=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a81fb7d3970b-500pi\" title=\"Rogue\" \/><\/a>&#0160;<\/font><\/p>\n<p><font face=\"Verdana\"><em>Courtesy PandaLabs<\/em><br \/>&#0160;<\/font><\/p>\n<p><font face=\"Verdana\">Turning hijacked computers into cash is still hard work for most computer criminals.&#0160; They&#39;ve got to trick the infected PC into sending spam, then trick a recipient into buying a useless product &#8212; or they have to steal online banking passwords, log onto a victim\u2019s account, bypass the bank\u2019s money transfer fraud controls, and so on.<\/font><\/p>\n<p><font face=\"Verdana\">It&#39;s much easier to just demand cash directly from infected users &#8212; a crime that&#39;s the Internet&#39;s equivalent of kidnapping.&#0160; <\/font><\/p>\n<p><font face=\"Verdana\">&quot;Give me all your money or your computer gets it-&quot; is the basic proposition.&#0160; <\/font><\/p>\n<p><font face=\"Verdana\">The technique was dubbed &quot;ransomware&quot; many years ago by computer virus researchers, and is not new.&#0160; What is new is the explosion of ransomware, thanks to the evolution of ever-more-believable tactics during recent months.<\/font><\/p>\n<\/p>\n<p><font face=\"Verdana\">In December, the FBI issued a warning about a broader category of malicious programs called &quot;rogueware.\u201d These programs appear on users&#39; machines and claim to find viruses, then offer to clean them for $50.&#0160; Rogueware looks so realistic &#8212; complete with Windows-like dialog boxes and scary warnings &#8212; that Web users were tricked into sending $150 million to criminals last year, <\/font><a href=\"http:\/\/www.ic3.gov\/media\/2009\/091211.asp\"><font face=\"Verdana\">the FBI says<\/font><\/a><font face=\"Verdana\">.<\/font> <\/p>\n<p><font face=\"Verdana\">The new ransomware is similar, but far more aggressive.&#0160; Once a computer is infected with it, the program does more than recommend a software purchase \u2013it simply won&#39;t let users continue to use their PC until they pay up. <\/font><\/p>\n<p><font face=\"Verdana\"><\/p>\n<p>Luis Corrons Granel, a researcher at Panda Security, said use of ransomware by criminals is exploding &#8212; 25 percent of all rogueware in the past quarter involved a family of intimidating products named &quot;TotalAntivirus.\u201d It demands that users pay $50 for two years, $79 for a lifetime license.<\/p>\n<p>\u201cThe increase (in ransomware) has been really significant,\u201d Granel said. A single family of ransomware programs called \u201cTotal Security\u201d made up one-quarter of all rogueware programs detected during the past three months, he said. <\/p>\n<p>To an average user, most rogueware would be indistinguishable from other standard antivirus products.&#0160; They look like fully functional software, showing Windows-like screens for firewall settings, file scanning, and every other tab you&#39;d expect from standard antivirus products. \u201cTotal Security\u201d even lets users choose their language &#8212; English, Spanish, and German are offered. <\/p>\n<p>The switch to ransomware by the bad guys makes sense, says Peter Cassidy, spokesman for the Anti-Phishing Working Group &#8212; because computer criminals are refining their programming methods, and getting more aggressive about taking people&#39;s money.<\/p>\n<p>\n<object height=\"300\" width=\"400\"><param name=\"allowfullscreen\" value=\"true\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><param name=\"movie\" value=\"http:\/\/vimeo.com\/moogaloop.swf?clip_id=6949998&amp;server=vimeo.com&amp;show_title=1&amp;show_byline=1&amp;show_portrait=0&amp;color=&amp;fullscreen=1\" \/><embed allowfullscreen=\"true\" allowscriptaccess=\"always\" height=\"300\" src=\"http:\/\/vimeo.com\/moogaloop.swf?clip_id=6949998&amp;server=vimeo.com&amp;show_title=1&amp;show_byline=1&amp;show_portrait=0&amp;color=&amp;fullscreen=1\" type=\"application\/x-shockwave-flash\" width=\"400\" \/><\/object><\/p>\n<p><font face=\"Verdana\"><em>See ransomware in action with this video from PandaLabs.<\/em><\/font><\/p>\n<p>&quot;Instead of trying to fool people and getting one out of 1,000 to pay, what they&#39;re doing now is just locking up the PC and telling them they have to pay,&quot; he said.&#0160; &quot;It&#39;s a really violent approach, really nasty.&quot;<\/p>\n<p>There might be one silver lining to the rise of ransomware, Cassidy said.&#0160; <\/p>\n<p>&quot;It&#39;s not in that gray area of selling people useless crap,&quot; he said.&#0160; \u201cIt\u2019s clearly criminal, and extortion does get the attention of law enforcement officials.\u201d<\/p>\n<p>As is customary, computer criminals are fusing this new attack with successful, older methods, said John Harrison, a security researcher at Symantec Corp. In one recent example, criminals first engaged in search engine &quot;poisoning,&quot; so their booby-trapped Web sites would rate high in Google searches about Haiti\u2019s earthquake. Visitors who clicked were tricked into downloading the ransomware software; and then were confronted with extortion demands.<\/p>\n<p>&quot;That&#39;s their distribution model,&quot; Harrison said -. &quot;They used to do it subtly, but now they are doing it much more brazenly.&quot;<\/p>\n<p><\/font><\/p>\n<p><font face=\"Verdana\"><a href=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a81fb307970b-pi\" style=\"DISPLAY: inline\"><img decoding=\"async\" alt=\"DataDoctor\" border=\"0\" class=\"asset asset-image at-xid-6a00d83451b0aa69e20120a81fb307970b \" src=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a81fb307970b-500pi\" title=\"DataDoctor\" \/><\/a>&#0160;<\/font><\/p>\n<p><font face=\"Verdana\"><em>Screen capture provided by PandaLabs.<\/em><\/font><\/p>\n<p><font face=\"Verdana\">In some versions, users will see a message that says, &quot;Google recommends you install this,&quot; or &quot;Microsoft recommends you turn this feature on- \u2026 then, they take over your computer and all of a sudden it looks like you have 900 viruses,&quot; he said.&#0160; <\/font><\/p>\n<p><font face=\"Verdana\">The latest flavor of ransomware, <a href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00001850.html\">described on Jan. 8 by security firm F-Secure<\/a>, doesn&#39;t disable all software, but it does something just as debilitating &#8212; it encrypts all the files on a victim&#39;s computer, and forces them to pay for decryption.&#0160; The program, which calls itself Data Doctor 2010, costs $89.<\/font><\/p>\n<p><font face=\"Verdana\"><strong>RED TAPE WRESTLING TIPS<\/strong><br \/>In some cases, researchers say, paying the ransom does work, at least initially. Still, it&#39;s a terrible idea to pay. On a grand scale, you&#39;ve just subsidized a criminal. But there are far more practical concerns &#8212; why would you trust the author of ransomware with your credit card number?&#0160; Perhaps you think you&#39;d never do this, but remember, the FBI says rogueware writers have made $150 million, so someone is paying up.<\/font><\/p>\n<p><font face=\"Verdana\">If an unexpected antivirus dialog box lands on your computer screen, close the window immediately by clicking on the &#39;x&#39; in the upper-right hand corner.&#0160; Don&#39;t use the &quot;OK\/Cancel&quot; buttons in the window &#8212; criminals often reprogram these.<\/font><\/p>\n<p><font face=\"Verdana\">You may or may not be infected anyway &#8212; it&#39;s possible you are already the victim of a &quot;drive-by download&quot; that doesn&#39;t require user interaction. So run an antivirus scan, if you can.<\/font><\/p>\n<p><font face=\"Verdana\">If the rogue software has actually taken over your computer, physically disconnect it from the Internet to avoid having your personal information sent back to the criminal. Then go to a different computer to search for solutions. Type in the name of the rogue software and search for information on well-known antivirus Web sites. Many antivirus firms offer free cleaners you can download or place onto a USB memory stick, and run on your infected computer.<\/font><\/p>\n<p><font face=\"Verdana\">But maintain healthy suspicion at all times. Ransomware authors have gone so far as to create fake software reviews about their products and place them around the Internet, even stealing logos from reputable technology publications, says Harrison.<\/font><\/p>\n<p><font face=\"Verdana\">&quot;The idea is you search for information about the program and this turns up, and you figure it&#39;s ok so you install it,&quot; he said.&#0160; &quot;Some of this is soft sell, some is very hard sell.&quot; <br \/>As always, it\u2019s never a good idea to follow links in e-mails when heading to Web sites \u2013 it takes an extra moment, but always click into your browser\u2019s address bar and manually type the address.<\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"FONT-FAMILY: Verdana; COLOR: black; FONT-SIZE: 13px\"><span style=\"MARGIN: 0in 0in 10pt; FONT-FAMILY: Verdana; FONT-SIZE: 14px\"><span style=\"LINE-HEIGHT: 115%; FONT-SIZE: 12pt\">&#0160;<span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; COLOR: black; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"COLOR: black; mso-themecolor: text1\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: arial, helvetica, clean, sans-serif\"><strong><span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\"><font face=\"Verdana\">Become a&#0160;<\/font><\/span><\/strong><a href=\"http:\/\/www.facebook.com\/pages\/Bob-Sullivan\/78714223105?_fb_noscript=1\" style=\"COLOR: blue; CURSOR: pointer; TEXT-DECORATION: underline\" ><strong><span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\"><font face=\"Verdana\">Red Tape Chronicles Facebook fan<\/font><\/span><\/strong><\/a><font face=\"Verdana\">&#0160;<span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\"><strong>or follow me at <\/strong><a href=\"http:\/\/twitter.com\/RedTapeChron\"><strong>http:\/\/twitter.com\/RedTapeChron<\/strong><\/a><\/span><\/font><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/font><\/span><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 9px\"><\/span><\/span><\/span><\/span><\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#0160; Courtesy PandaLabs&#0160; Turning hijacked computers into cash is still hard work for most computer criminals.&#0160; They&#39;ve got to trick the infected PC into sending spam, then trick a recipient into buying a useless product &#8212; or they have to steal online banking passwords, log onto a victim\u2019s account, bypass the bank\u2019s money transfer fraud [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-245362","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/245362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=245362"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/245362\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=245362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=245362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=245362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}