Categories: SecurityWorkspace

Cryptolocker Variant Automatically Infects USB Drives

A new variant of the file-encrypting ransomware known as Cryptolocker has begun spreading using a dangerous new feature: self propagation through USB drives, according to multiple security firms.

Antivirus firms Trend Micro and ESET both found evidence of the new version of Cryptolocker spreading on the Internet. The malicious software is somewhat different than the original Cryptolocker, including functionality which creates a copy of itself on removable media, suggesting that the malware could be a copycat.

Wide distribution

The ability to spread to other computers and encrypt data means that the ransomware variant could spread more widely than the original Cryptolocker, according to JD Sherry, vice president of technology and solutions for Trend Micro.

“This is a clear-cut example of something that, whether it is a variant or a copycat, it’s another low-cost channel to deliver malware with the end goal of trying to steal sensitive information, such as banking credentials or getting a ransom,” Sherry told eWEEK.

Cryptolocker has raised the bar for the class of malware known as ransomware. Ransomware typically locks a PC by modifying the operating system until the user pays a fee. Cryptolocker, however, uses the Windows operating system’s encryption library to make more than 70 types of files unreadable without a key. The malware has effectively forced many companies to pay the ransom because they did not have adequate backups to recover the data.

While the latest resurgence of ransomware schemes began more than a year ago in Russia and Eastern Europe, more than half of all Cryptolocker infections are in the United States. The latest version, called “Cryptolocker 2.0” by its creators, can spread like a virus or worm by infecting USB sticks. While the malware does not apparently have the ability to automatically run, the copied executable file could allow it to spread further, according to Trend Micro.

Copycat?

Originally found by antivirus firm ESET on 19 December, Cryptolocker 2.0 has some differences from the original version. The variant claims to use a stronger form of encryption, RSA-4096, but in reality, uses a weaker version, RSA-1024. The original version used RSA-2048. In addition, the new version only allows victims to pay via Bitcoin, while the original Cryptolocker allowed other forms of payment, as well.

When researchers further analysed the code, the differences became more pronounced. The new variant is written in the C# programming language, but the original Cryptolocker was written in Microsoft’s Visual C++. In addition, although the original CryptoLocker focused on business files, the new version encrypts images, video and audio files, as well.

Those differences, in addition to changes to the encryption methods, have led researchers to conclude that the latest version is likely a copycat of Cryptolocker.

“It is unlikely that the malware that calls itself ‘Cryptolocker 2.0’ is actually a new version of the previous Cryptolocker malware from the same authors,” ESET stated in its blog post. “The switch from C++ to C# would be something unexpected to say the least, and in any case, none of the key differences can be considered significant improvements.”

Are you a security pro? Try our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

3 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

6 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

8 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

23 hours ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

1 day ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

1 day ago