Categories: SecurityWorkspace

Ransomware Scam Hits UK Small Businesses

The National Cyber Crime Unit (NCCU), part of the  National Crime Agency’s (NCA), has warned of a “ransomware” campaign that appears to be targeting British small and medium businesses. The NCA assessed the event as a “significant risk”.

The attacks are being carried out via email messages that appear to originate from banks or other financial institutions. The emails, which are being sent to tens of millions of UK users, contain an attachment which appears to be correspondence referred to in the email message; according to the NCA this might seem to be
a voicemail, fax or details of a suspicious transaction.

Encryption malware

The attachment is, however, in fact a piece of malicious code that can install Cryptolocker, an application which works by encrypting files on the user’s system and on the local network it is attached to.

Cryptolocker then displays a splash screen with a countdown timer and a demand for 2 Bitcoins (about £805 as of Tuesday morning) in ransom for the decryption key.

Bitcoins are favoured by hackers for the level of anonymity they allow. Ironically, the value of Bitcoins saw a sharp increase, from around £200 to more than £500, following comments in the US Senate on Monday that indicated the US government considers digital currencies a “legitimate” financial service. As of Tuesday morning Bitcoin’s value had descended to around £400.

The NCA said it does not endorse the payment of a ransom to criminals and emphasised that there is no guarantee that the payment would be honoured. The BBC said it was aware of cases in which the ransom had been paid but the files could not be decrypted.

“The NCA are actively pursuing organised crime groups committing this type of crime,” said NCCU deputy head Lee Miles in a statement provided to the press. “We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public.”

Ransomware

Anyone encountering the malware should report it to Action Fraud, according to the NCA. The agency said users should not click on unknown attachments, should use up-to-date operating systems and antivirus tools, should back-up their files and should disconnect infected machines from networks.

CryptoLocker surfaced earlier this year and targets Windows systems. It encrupts files on local and network-mounted disks with RSA public-key cryptography, with the private key stored on the malware’s control servers. So far researchers have not succeeded in decrypting the files affected by the malware.

Last year a ransomware attack prentending to originate from police agencies made the rounds, with one variant capable of communicating in multiple languages.

The Android mobile platform was targeted by ransomware earlier this year.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

1 day ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

1 day ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

1 day ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

2 days ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

2 days ago