The National Cyber Crime Unit (NCCU), part of the National Crime Agency’s (NCA), has warned of a “ransomware” campaign that appears to be targeting British small and medium businesses. The NCA assessed the event as a “significant risk”.
The attacks are being carried out via email messages that appear to originate from banks or other financial institutions. The emails, which are being sent to tens of millions of UK users, contain an attachment which appears to be correspondence referred to in the email message; according to the NCA this might seem to be
a voicemail, fax or details of a suspicious transaction.
The attachment is, however, in fact a piece of malicious code that can install Cryptolocker, an application which works by encrypting files on the user’s system and on the local network it is attached to.
Cryptolocker then displays a splash screen with a countdown timer and a demand for 2 Bitcoins (about £805 as of Tuesday morning) in ransom for the decryption key.
The NCA said it does not endorse the payment of a ransom to criminals and emphasised that there is no guarantee that the payment would be honoured. The BBC said it was aware of cases in which the ransom had been paid but the files could not be decrypted.
“The NCA are actively pursuing organised crime groups committing this type of crime,” said NCCU deputy head Lee Miles in a statement provided to the press. “We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public.”
Anyone encountering the malware should report it to Action Fraud, according to the NCA. The agency said users should not click on unknown attachments, should use up-to-date operating systems and antivirus tools, should back-up their files and should disconnect infected machines from networks.
CryptoLocker surfaced earlier this year and targets Windows systems. It encrupts files on local and network-mounted disks with RSA public-key cryptography, with the private key stored on the malware’s control servers. So far researchers have not succeeded in decrypting the files affected by the malware.
Last year a ransomware attack prentending to originate from police agencies made the rounds, with one variant capable of communicating in multiple languages.
The Android mobile platform was targeted by ransomware earlier this year.
Are you a security pro? Try our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…