Cryptolocker weekly haul? More than 10k victims

Răzvan STOICA

November 13, 2013

Promo Protect all your devices, without slowing them down.
Free 30-day trial
Cryptolocker weekly haul? More than 10k victims

Bitdefender Labs researchers have reverse-engineered the Cryptolocker domain generation algorythm and sinkholed the relevant domains between October 27 and November 1.

During that period, 12016 infected hosts tried to contact the sinkholed domains; the majority of connection attempts came from US-based IP addresses. in fact, judging by the distribution of infected hosts and the payment methods available, it would seem that only systems in the US are targeted, with the rest being collateral damage.

 

distributie_tari_cryptolocker

The domain generation algorithm is used to avoid the possibility that the network gets shut down by authorities, by generating new command and control subdomains every day. However, once it has been reverse engineered, security researchers can pre-register the relevant domains and count connection attempts.

Cryptolocker servers are changed very often – it is rare that a command and control server remains online for more than a week. During the monitored period, command and control servers were located in Russia, Germany, Kazakhstan and the Ukraine – but this is simply an indication of the controllers’ predilection for constant “server-hopping”.

Almost all the cryptolocker command and control servers also host a public payment service through which victims can purchase decryption keys.

decrypt_cryptolocker

 

 

 

 

Bitdefender detects and blocks Cryptolocker, as usual. An encryption-blocking tool can also be found here.

tags


Author


Răzvan STOICA

Razvan Stoica is a journalist turned teacher turned publicist and technology evangelist. Recruited by Bitdefender in 2004 to add zest to the company's online presence.

View all posts

You might also like

Bookmarks


loader