{"id":16460,"date":"2014-05-05T09:17:39","date_gmt":"2014-05-05T15:17:39","guid":{"rendered":"https://www.webroot.com/blog/?p=16460"},"modified":"2018-10-05T13:23:08","modified_gmt":"2018-10-05T19:23:08","slug":"evolution-encrypting-ransomware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/05\/05\/evolution-encrypting-ransomware\/","title":{"rendered":"Evolution of Encrypting Ransomware"},"content":{"rendered":"<p>Recently we&#8217;ve seen a big change in the encrypting ransomware family and we&#8217;re going to shed light on some of the newest variants and the stages of evolution that have led\u00a0the high profile malware to where it is today. For those that aren&#8217;t aware of what encrypting ransomware is, its a crypto virus that encrypts\u00a0all your data from local hard drives, network shared drives, removable hard drives and USB. The encryption is done using an RSA -2048 asymmetric public key which makes decryption without the key impossible. Paying the ransom will net you the key which in turn leads to getting your data back.<\/p>\n<p><strong>Cryptolocker<\/strong><\/p>\n<div class=\"et_pb_slider et_pb_slider_fullwidth_off et_pb_gallery_post_type\">\n\t\t\t\t<div class=\"et_pb_slides\">\n\t\t\t\t\t<div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker1.png);\"><\/div><div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker2.png);\"><\/div><div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker3.png);\"><\/div><div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker4.png);\"><\/div><div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker5.png);\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n<p>In it&#8217;s first evolution of what we know as &#8220;Cryptolocker&#8221; the encryption key was actually stored on the computer and the victim, with enough effort could retrieve said key.\u00a0Then you could use tools submitted on forums to put in your key and decrypt all your data without paying the ransom. In future improvements malware authors made sure that the only place the key was stored was on a secure server so that you were forced to pay. However, more often than not the malicious dropper didn&#8217;t delete the VSS (Volume Shadow Service) and victims still had the option to manually restore files from a previous date using programs like Shadow explorer (OS drive only). For those that don&#8217;t know what the VSS is it&#8217;s a restorative feature that is included in XP sp2 and later versions of windows.\u00a0Essentially it is a technology that allows taking manual or automatic backup copies of data and is related to system restore<span style=\"color: #252525;\">.<\/span> In newer variants of Cryptolocker the VSS is almost always deleted at deployment. Malware authors\u00a0also give the victim a special extended period of time to get their files they waited past the deadline, but the price usually doubles of triples.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>CryptoDefense<\/strong><\/p>\n<div class=\"et_pb_slider et_pb_slider_fullwidth_off et_pb_gallery_post_type\">\n\t\t\t\t<div class=\"et_pb_slides\">\n\t\t\t\t\t<div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker6.png);\"><\/div><div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker7.png);\"><\/div><div class=\"et_pb_slide\" style=\"background: url(https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/cryptolocker8.png);\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n<p>In one of the more recent variants of encryption ransomware dubbed &#8220;CryptoDefense&#8221; it no longer has a graphical user interface (GUI). Instead the malware will just open a webpage after encryption and leave a text file at every directory that was encrypted. The instructions to get the key to decrypt your files have you install anonymous tor or other layered encryption browsers so you can pay them directly and securely. this enables malware authors to circumvent a portion of the Zeus fraud avoid the need for money mules (middle man) and increasing the percentage of profit.<\/p>\n<p><strong>DirCrypt<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/dircrypt.png\"><img decoding=\"async\" loading=\"lazy\" width=\"150\" height=\"150\" class=\"alignnone size-thumbnail wp-image-16469\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/dircrypt-150x150.png\" alt=\"DirCrypt\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/dircrypt-150x150.png 150w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/dircrypt-125x125.png 125w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>In this most recent change in encrypting ransomware. Instead of going after various file extensions, all files are encrypted into RTF documents with a *.enc.rtf extension. This one really blind sides the victim as you&#8217;ll get no pop up GUI or web page once encryption completes; you have to open one of your documents to find that it was encrypted. All documents will have the same content similar to what is shown. One big improvement that is quite nasty for victims is the encryption is no longer a static one time deal. This variant will actively seek out and encrypt any new or modified files written to drives. We noticed while testing a collected sample that when we\u00a0attempted to save screenshots, that it immediately encrypted them. We expect future encrypting ransomware variants to include these tactics as the evolution continues.<\/p>\n<p><a style=\"color: #517d19;\" href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot SecureAnywhere<\/a><span style=\"color: #555555;\">\u00a0users are proactively protected from the variants shown. We are constantly working with the evolving\u00a0threat landscape to protect against the newest variants as they progress.<\/span><\/p>\n<p><a style=\"color: #517d19;\" href=\"https:\/\/www.webroot.com\/us\/en\/support\/support-home\">Webroot support<\/a><span style=\"color: #555555;\">\u00a0is always more than happy to help with removal and any questions regarding infections.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently we&#8217;ve seen a big change in the encrypting ransomware family and we&#8217;re going to shed light on some of the newest variants and the stages of evolution that have led\u00a0the high profile malware to where it is today. For those that aren&#8217;t aware of what encrypting ransomware is, its a crypto virus that encrypts\u00a0all [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":17050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4671,3769,20445,16737,10279,5443,5435,8787,23191,3483,23185,8293,3477,4661,23187,17497,3937,5441,3927,23189],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16460"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=16460"}],"version-history":[{"count":15,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16460\/revisions"}],"predecessor-version":[{"id":25809,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16460\/revisions\/25809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17050"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=16460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=16460"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=16460"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=16460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}