Have any question?

Text or Call (954) 573-1300

Blog

LSeven Solutions Blog

LSeven Solutions has been serving the Fort Lauderdale area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: Computers Held Hostage

As computer technology around us continues to advance, so too does the development of computer viruses, spyware and malware. The latest digital plague is called Ransomware, malicious software that takes over the hard drive of infected computers until ransom is paid.

When one considers the enormous variety of computer viruses that exist today, it is difficult to decide where to start a discussion of the topic. As of today, there are 768 distinct "families" of malware listed on Symantec's Security Response page, some of whom possess hundreds and thousands of "offspring." In 2010, it was estimated that that five malware samples emerged onto the internet every 30 seconds, with 15-20 Trojans being released every half hour.

As we know from experience, these viruses can cause a variety of serious and not so serious consequences, from needing to use file backups and anti-virus programs to wiping your computer back to factory settings. However, a new kind of virus known as Ransomware has become increasing prevalent, which is all the more concerning given that victims of Ransomware often do not inform the authorities. One of the most prominent recent examples of Ransomware is known as the Reveton virus, and it poses significant risk. Reveton is defined as "drive-by" malware for a very good reason, because unlike many other viruses, downloading or opening files and attachments is not needed for the virus to spread. In fact, merely clicking on an infected site can instantly lead to your computer being locked.

Ransomware functions by encrypting or otherwise blocking access to a computer's hard drive. Once this is accomplished, the malware generates warning messages that resemble those of law enforcement and governmental agencies (FBI, U.S. Justice Department, etc.). These messages usually claim that the computer user has broken some law, which ranges from under-aged viewing of pornography and computer-use negligence to accusations of child pornography present on the system, massive illegal downloading and other serious charges. Some variations of Revelton are even sophisticated enough to remotely access webcams, so that a picture of the computer user will display on the frozen screen along with the warning to lend credibility. However, the "FBI" is perfectly willing to let these crimes slide, as long as you provide the fine using your personal information and a prepaid money card (which is untraceable). To accomplish this, the malware can ascertain the computer's geographical location from their IP address, then make appropriate payment service suggestions based on that data.

As if all of this wasn't bad enough, the original Reveton malware has been "upgraded" with the incorporation of the Citadel Trojan. While not a new Trojan, due to its versatility and open-source customization, Citadel remains a favored tool in crimeware kits by remaining on the system even after the ransom has been paid. This provides further opportunities for identity theft and access to personal and financial data by including the capabilities to steal login information, use key-logging programs and employ man-in-the-browser techniques to alter web transactions in real-time. In addition, the malware is smart enough to generate unique pages for each country that Ransomware appears in so that it looks like the correct agency is monitoring you.

Because of the very personal nature of this scam, as well as the potential consequences for crimes like child pornography, Ransomware is only recently coming to the attention of the mainstream. While these viruses are not impossible to remove, many individuals will simply pay the fine rather than risk causing any legal troubles by talking to the authorities themselves.

Other varieties of Ransomware Viruses include fake anti-virus and anti-spyware programs, as well as copyright protection services who "scan" your computer for copyright protected materials and force you to pay a fine.

Subsequent investigation has traced the likely source of such malware to the activities of a Russian cybercrimes gang who have been very active over the last few years. Countries that have been affected by this strain of Ransomware include Germany, the U.K., Spain, France, Italy, Belgium and the U.S., which is not to say that these Russian gangsters have refrained from robbing their own people. However, despite the dire nature of Ransomware, there are several steps that you and your business can take to prevent Ransomware infections. The Internet Crime Complaints Center or IC3 recommends these following steps if you contract Reveton:

  • Do not pay any money or provide any personal information.
  • Contact a computer professional to remove Reveton and Citadel from your computer.
  • Be aware that even if you are able to unfreeze your computer on your own, the malware may still operate in the background. Certain types of malware have been known to capture personal information such as user names, passwords, and credit card numbers through embedded keystroke logging programs.
  • File a complaint and look for updates about the Reveton virus on the IC3 website.


If you suspect you have malware, ransomware, or any type of viruses, running antivirus isn't always enough. Reach out to us and have one of our professional computer technicians check your computer and network for any signs of malware. You can call us at (954) 573-1300

Tablet Cage Match: Nexus vs. Kindle
Is an Ultrabook Right for You?
 

Comments

No comments made yet. Be the first to submit a comment
<br />
<b>Warning</b>:  Attempt to read property /home/l7solutions/public_html/templates/ati/html/com_easyblog/comments/form.php on line 20
Guest"/>
Already Registered? Login Here
Friday, 22 November 2024

Warning: Undefined variable $registration in /home/l7solutions/public_html/templates/ati/html/com_easyblog/comments/form.php on line 57

Warning: Undefined variable $registration in /home/l7solutions/public_html/templates/ati/html/com_easyblog/comments/form.php on line 91

Captcha Image

Customer Login

Customer Feedback

News & Updates

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

Learn more about what L7 Solutions can do for your business.

L7 Solutions
7890 Peters Road Building G102,
Plantation, Florida 33324