Categories: SecurityWorkspace

Cryptolocker Variant Automatically Infects USB Drives

A new variant of the file-encrypting ransomware known as Cryptolocker has begun spreading using a dangerous new feature: self propagation through USB drives, according to multiple security firms.

Antivirus firms Trend Micro and ESET both found evidence of the new version of Cryptolocker spreading on the Internet. The malicious software is somewhat different than the original Cryptolocker, including functionality which creates a copy of itself on removable media, suggesting that the malware could be a copycat.

Wide distribution

The ability to spread to other computers and encrypt data means that the ransomware variant could spread more widely than the original Cryptolocker, according to JD Sherry, vice president of technology and solutions for Trend Micro.

“This is a clear-cut example of something that, whether it is a variant or a copycat, it’s another low-cost channel to deliver malware with the end goal of trying to steal sensitive information, such as banking credentials or getting a ransom,” Sherry told eWEEK.

Cryptolocker has raised the bar for the class of malware known as ransomware. Ransomware typically locks a PC by modifying the operating system until the user pays a fee. Cryptolocker, however, uses the Windows operating system’s encryption library to make more than 70 types of files unreadable without a key. The malware has effectively forced many companies to pay the ransom because they did not have adequate backups to recover the data.

While the latest resurgence of ransomware schemes began more than a year ago in Russia and Eastern Europe, more than half of all Cryptolocker infections are in the United States. The latest version, called “Cryptolocker 2.0” by its creators, can spread like a virus or worm by infecting USB sticks. While the malware does not apparently have the ability to automatically run, the copied executable file could allow it to spread further, according to Trend Micro.

Copycat?

Originally found by antivirus firm ESET on 19 December, Cryptolocker 2.0 has some differences from the original version. The variant claims to use a stronger form of encryption, RSA-4096, but in reality, uses a weaker version, RSA-1024. The original version used RSA-2048. In addition, the new version only allows victims to pay via Bitcoin, while the original Cryptolocker allowed other forms of payment, as well.

When researchers further analysed the code, the differences became more pronounced. The new variant is written in the C# programming language, but the original Cryptolocker was written in Microsoft’s Visual C++. In addition, although the original CryptoLocker focused on business files, the new version encrypts images, video and audio files, as well.

Those differences, in addition to changes to the encryption methods, have led researchers to conclude that the latest version is likely a copycat of Cryptolocker.

“It is unlikely that the malware that calls itself ‘Cryptolocker 2.0’ is actually a new version of the previous Cryptolocker malware from the same authors,” ESET stated in its blog post. “The switch from C++ to C# would be something unexpected to say the least, and in any case, none of the key differences can be considered significant improvements.”

Are you a security pro? Try our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Alphabet Value Surges Over $2tn On Dividend Plan

Google parent Alphabet sees market capitalisation surge over $2tn on plan to over first-ever cash…

2 hours ago

Google Asks US Court To Dismiss Federal Adtech Case

Google asks Virginia federal court to dismiss case brought by US Justice Department and eight…

2 hours ago

Snap Sees Surge In Users, Ad Revenues

Snapchat parent Snap reports user growth, revenues in spite of tough competition, in what may…

3 hours ago

Intel Shares Sink As AI Surge Hits Chip Revenue

Intel shares sag after company shares gloomy revenue predictions, as data centre chip demand hit…

4 hours ago

Email Provider Complains To EU Over Reduced Google Rankings

Germany's Tuta Mail says Google broke EU's new DMA rules with March algorithm update that…

4 hours ago

US Regulator Probes Effectiveness Of Tesla Autopilot Recall

US auto safety regulator opens new investigation into adequacy of Tesla Autopilot recall, saying it…

5 hours ago