Telekomunikasi Sains    
   
Daftar Isi
(Sebelumnya) RanorexRapha�l (JavaScript library) (Berikutnya)

Ransomware (malware)

A ransomware payload attempting to extort money from a user by fraudulently claiming that the user must pay a fine to the Metropolitan Police Service.

Ransomware (also referred to in some cases as cryptoviruses, cryptotrojans, cryptoworms or scareware) comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Some forms of ransomware encrypt files on the system's hard drive, while some may simply lock the system and display messages intended to coax the user into paying. Modern ransomware attacks were initially popular within Russia, but in recent years there have been an increasing number of ransomware attacks targeted towards other countries, such as Australia, Germany, and the United States among others.[1][2][3]

Contents

Operation

Ransomware typically propagates like a conventional computer worm, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program will then run a payload: such as one that will begin to encrypt personal files on the hard drive.[4][5][6] More sophisticated ransomware may hybrid-encrypt the victim's plaintext with a random symmetric key and a fixed public key. The malware author is the only party that knows the needed private decryption key.[7] Some ransomware payloads do not use encryption. In these cases, the payload is simply an application designed to effectively restrict interaction with the system, typically by overriding explorer.exe in the Windows registry as the default shell,[8] or even modify the master boot record, not allowing the operating system to start at all until it is repaired.[9]

Ransomware payloads, especially ones which do not encrypt files, utilize elements of scareware to coax the user into paying for its removal. The payload may, for example, display notices purportedly issued by companies or law enforcement agencies which falsely claim that the user's system had been used for illegal activities, or contains illegal content such as pornography and unlawfully obtained software.[10][11] Some ransomware payloads imitate Windows XP's product activation notices, falsely claiming that their computer's Windows installation is counterfeit or requires re-activation.[12]

In any case, the ransomware will attempt to extort money from the system's user by forcing them to purchase either a program to decrypt the files it had encrypted, or an unlock code which will remove the locks it had applied. These payments are often delivered using either a wire transfer, premium-rate text messages,[13] or through an online payment voucher service such as Ukash or Paysafecard.[1][14][15]

History

Encrypting ransomware

The first known ransomware was the 1989 "PC Cyborg" trojan written by Joseph Popp, which triggered a payload claiming that the user's license to use a certain piece of software had expired, encrypted file names on the hard drive, and required the user to pay 189 United States dollars to "PC Cyborg Corporation" in order to unlock the system. Researchers discovered, however, that Popp had used symmetric cryptography, which was easily broken. Popp was declared mentally unfit to stand trial for his actions, but he promised to donate the profits from the malware to fund AIDS research.[16] The notion of using public key cryptography for such attacks was introduced in 1996 by Adam L. Young and Moti Yung, who presented a proof-of-concept cryptovirus for the Macintosh SE/30 using RSA and TEA. Young and Yung referred to this attack as cryptoviral extortion, an overt attack that is part of a larger class of attacks in a field called cryptovirology, which encompasses both overt and covert attacks.[4]

Examples of extortionate ransomware reappeared in May 2005.[17] By mid-2006, worms such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated RSA encryption schemes, with ever-increasing key-sizes. Gpcode.AG, which was detected in June 2006, was encrypted with a 660-bit RSA public key.[18] In June 2008, a variant known as Gpcode.AK was detected. Using a 1024-bit RSA key, it was believed to be large enough to be computationally infeasible to break without a concerted distributed effort.[7][19][20][21]

Non-encrypting ransomware

In August 2010, Russian authorities arrested ten individuals who had been connected to WinLock, a ransomware which displayed pornographic images and asked users to send a premium-rate text message costing around US$10 to receive a code which can unlock their machines. The scam hit a large number of users across Russia and neighboring countries—reportedly earning the group over US$16 million. Unlike the previous Gpcode worms, WinLock did not use encryption, using a more trivial process of simply requiring an activation code.[11][22]

In 2011, a ransomware worm imitating the Windows Product Activation notice surfaced that informed users that a system's Windows installation would have to be re-activated due to "[being a] victim of fraud". An online activation option was offered (like the actual Windows activation process), but was unavailable, requiring the user to call one of six international numbers to input a 6-digit code. While the malware claimed that this call would be free, it was routed through a rogue operator in a country with high international phone rates, who placed the call on hold, causing the user to incur large long distance charges.[12]

Reveton

In 2012, a major ransomware worm known as Reveton, also nicknamed the "Police Trojan", began to spread. Based on the Citadel trojan (which itself, is based on the Zeus trojan), its payload displays a warning purportedly from a law enforcement agency, claiming that the computer had been used for illegal activities; such as downloading pirated software.[23] The warning informs the user that to unlock their system, they would have to pay a fine using a voucher from an anonymous prepaid cash service such as Ukash or Paysafecard. To increase the illusion that the computer is being tracked by law enforcement, the screen also displays the computer's IP address as well, while recent versions can also purportedly show footage from a computer's webcam to give the illusion that the user is also being recorded by law enforcement.[1][24]

Variants that targeted the United Kingdom included ones branded as being from the Metropolitan Police Service, the collection society PRS for Music (which specifically accused the user of illegally downloading music), and the Police National E-Crime Unit.[25][26] In a statement warning the public about the malware, the Metropolitan Police clarified that they would never lock a computer in such a way as part of an investigation.[1][10]

Reveton initially began spreading in various European countries in early 2012.[1] In May 2012, Trend Micro threat researchers discovered templates for variations for the United States and Canada, suggesting that its authors may have been planning to target users in North America.[27] By August 2012, a new variant of Reveton began to spread in the United States, claiming to require the payment of a $200 fine to the FBI using a MoneyPak card.[24][2][3]

Winwebsec

Main article : Winwebsec
Winwebsec is a rogue security software category of malware that attacks the users of Windows operating systems and produces fake claims as genuine Anti-Malware software. They show popups that claim to scan for malware and display fake warnings similar to "32 Viruses and Trojans Detected on your computer. Click on Fix Now button to clean these threats". They then show a message to the user that they need to pay money to activate the software in order to remove these nonexistent threats.

See also

References

  1. ^ a b c d e Dunn, John E.. "Ransom Trojans spreading beyond Russian heartland". TechWorld. http://news.techworld.com/security/33 43528/ransom-trojans-spreading-beyond -russian-heartland/. Retrieved 10 March 2012.
  2. ^ a b "New Internet scam: Ransomware...". FBI. Aug. 9, 2012. http://www.fbi.gov/news/stories/2012/ august/new-internet-scam/new-internet -scam.
  3. ^ a b "Citadel malware continues to deliver Reveton ransomware...". Internet Crime Complaint Center (IC3). Nov. 30, 2012. http://www.ic3.gov/media/2012/121130. aspx.
  4. ^ a b Young, A.; Moti Yung (1996). "Cryptovirology: extortion-based security threats and countermeasures". Proceedings 1996 IEEE Symposium on Security and Privacy. p. 129. doi:10.1109/SECPRI.1996.502676. ISBN 0-8186-7417-2.  edit
  5. ^ Adam Young (2005). "Building a Cryptovirus Using Microsoft's Cryptographic API". In Zhou, Jianying; Lopez, Javier. Information Security: 8th International Conference, ISC 2005 (Springer-Verlag). pp. 389–401. 
  6. ^ Young, Adam (2006). "Cryptoviral Extortion Using Microsoft's Crypto API: Can Crypto APIs Help the Enemy?". International Journal of Information Security (Springer-Verlag) 5 (2): 67–76. 
  7. ^ a b Naraine, Ryan (2008-06-06). "Blackmail ransomware returns with 1024-bit encryption key". ZDnet. http://blogs.zdnet.com/security/?p=12 51. Retrieved 2009-05-03.
  8. ^ "Ransomware: Fake Federal German Police (BKA) notice". SecureList (Kaspersky Lab). http://www.securelist.com/en/blog/615 5/Ransomware_Fake_Federal_German_Poli ce_BKA_notice. Retrieved 10 March 2012.
  9. ^ "And Now, an MBR Ransomware". SecureList (Kaspersky Lab). http://www.securelist.com/en/blog/208 188032/And_Now_an_MBR_Ransomware. Retrieved 10 March 2012.
  10. ^ a b "Police warn of extortion messages sent in their name". Helsingin Sanomat. http://www.hs.fi/english/article/Poli ce+warn+of+extortion+messages+sent+in +their+name/1329103586716. Retrieved 9 March 2012.
  11. ^ a b McMillian, Robert. "Alleged Ransomware Gang Investigated by Moscow Police". PC World. http://www.pcworld.com/businesscenter /article/204577/alleged_ransomware_ga ng_investigated_by_moscow_police.html. Retrieved 10 March 2012.
  12. ^ a b "Ransomware squeezes users with bogus Windows activation demand". Computerworld. http://www.computerworld.com/s/articl e/9215711/Ransomware_squeezes_users_w ith_bogus_Windows_activation_demand. Retrieved 9 March 2012.
  13. ^ Danchev, Dancho (2009-04-22). "New ransomware locks PCs, demands premium SMS for removal". ZDNet. http://blogs.zdnet.com/security/?p=31 97. Retrieved 2009-05-02.
  14. ^ "Ransomware plays pirated Windows card, demands $143". Computerworld. http://www.computerworld.com/s/articl e/9219745/Ransomware_plays_pirated_Wi ndows_card_demands_143. Retrieved 9 March 2012.
  15. ^ Cheng, Jacqui (2007-07-18). "New Trojans: give us $300, or the data gets it!". Ars Technica. http://arstechnica.com/security/news/ 2007/07/new-trojans-give-us-300-or-th e-data-gets-it.ars. Retrieved 2009-04-16.
  16. ^ Kassner, Michael. "Ransomware: Extortion via the Internet". TechRepublic. http://www.techrepublic.com/blog/secu rity/ransomware-extortion-via-the-int ernet/2976. Retrieved 10 March 2012.
  17. ^ Schaibly, Susan (2005-09-26). "Files for ransom". Network World. http://www.networkworld.com/buzz/2005 /092605-ransom.html?page=3. Retrieved 2009-04-17.
  18. ^ Leyden, John (2006-07-24). "Ransomware getting harder to break". The Register. http://theregister.co.uk/2006/07/24/r ansomware/. Retrieved 2009-04-18.
  19. ^ Lemos, Robert (2008-06-13). "Ransomware resisting crypto cracking efforts". SecurityFocus. http://www.securityfocus.com/news/115 23. Retrieved 2009-04-18.
  20. ^ Krebs, Brian (2008-06-09). "Ransomware Encrypts Victim Files With 1,024-Bit Key". Washington Post. http://voices.washingtonpost.com/secu rityfix/2008/06/ransomware_encrypts_v ictim_fil.html. Retrieved 2009-04-16.
  21. ^ "Kaspersky Lab reports a new and dangerous blackmailing virus". Kaspersky Lab. 2008-06-05. http://www.kaspersky.com/news?id=2075 75650. Retrieved 2008-06-11.
  22. ^ Leyden, John. "Russian cops cuff 10 ransomware Trojan suspects". The Register. http://www.theregister.co.uk/2010/09/ 01/ransomware_trojan_suspects_cuffed/. Retrieved 10 March 2012.
  23. ^ "Fake cop Trojan 'detects offensive materials' on PCs, demands money". The Register. http://www.theregister.co.uk/2012/04/ 05/police_themed_ransomware/. Retrieved 15 August 2012.
  24. ^ a b "Reveton Malware Freezes PCs, Demands Payment". InformationWeek. http://www.informationweek.com/securi ty/attacks/reveton-malware-freezes-pc s-demands-paym/240005598. Retrieved 16 August 2012.
  25. ^ Whitney, Lance. "Ransomware locks up PCs in fake anti-piracy campaign". ZDnet.co.uk. http://www.zdnet.co.uk/news/security- threats/2012/05/08/ransomware-locks-u p-pcs-in-fake-anti-piracy-campaign-40 155180/. Retrieved 11 May 2012.
  26. ^ Dunn, John E.. "Police alert after ransom Trojan locks up 1,100 PCs". TechWorld. http://news.techworld.com/security/33 73656/police-issue-alert-after-ransom -trojan-infects-1100-pcs/. Retrieved 16 August 2012.
  27. ^ Constantian, Lucian. "Police-themed Ransomware Starts Targeting US and Canadian Users". PC World. http://www.pcworld.com/businesscenter /article/255303/policethemed_ransomwa re_starts_targeting_us_and_canadian_u sers.html. Retrieved 11 May 2012.

External links

(Sebelumnya) RanorexRapha�l (JavaScript library) (Berikutnya)