{"id":5896,"date":"2016-11-11T14:02:02","date_gmt":"2016-11-11T06:02:02","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=5896"},"modified":"2016-11-11T14:02:02","modified_gmt":"2016-11-11T06:02:02","slug":"locky-ransomware-is-the-3rd-most-deadly","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/locky-ransomware-is-the-3rd-most-deadly\/","title":{"rendered":"Locky ransomware is the 3rd most ‘deadly’"},"content":{"rendered":"
For the first time ever, ransomware has been named the 3rd most ‘deadliest’ types of malicious software (malware) out there in cyber crime’s history. It’s all thanks to “Locky” ransomware. Ransomware is a a rather nasty type of malware<\/a> that holds your computer or mobile device to ransom by encrypting all the files on your computing device or it will constantly show an image such as a pornographic image until you pay up.<\/p>\n While many people have heard of ransomware in the news due to fake emails pretending to be an energy company that you are with or perhaps a trusted organisation, previously ransomware was not considered the worst of the worst.<\/p>\n That is, until now.<\/p>\n This year is the year has been totally been ransomware season according to an article on Softpedia<\/a>.<\/p>\n Please note that only malware affecting desktop computers are included. The top 3 mobile malware are\u00a0HummingBad, Triada, and Ztorg.<\/p>\n <\/p>\n Starting from 2008, Conficker is a worm targeting Windows computers. It initially targeted Windows XP computers, however the worm has evolved with time. At the moment, it specialises\u00a0as a computer\u00a0virus infection that goes viral. It has the ability to download other malware when instructed by their C&C server which enables it to steal your credentials and even disable security software.<\/p>\n <\/p>\n Believed to have originated from Russia in 2003, Sality is a polymorphic virus which constantly evolves and is hard to detect. Similarly to Conficker, it is controlled by a botnet<\/a>. It has the ability to infect computers via different methods. Sality’s goal is to infect executable files and download complex malware.<\/p>\n Read here to find out how a polymorphic virus evades antivirus software.<\/a><\/em><\/p>\n <\/p>\n Making its debut in 2016, this ransomware<\/a> family variant locks down the files on your computer with an encryption algorithm that is currently uncrackable. It spreads in a few ways:<\/p>\n In a recent report by cyber security solution provider Proofpoint, they claimed that 97% of all malicious email attachments were due to Locky. It is thought that the it originates from the Necurs botnet which has an army of over 6 million bots ready to spam unsuspecting victims. It is thought that it\u00a0is managed by the same online crime gang<\/a> that spread the Dridex banking trojan.<\/p>\n <\/p>\n First appearing in 2007, it is basically a combination of a Pushdo trojan and a botnet. Using simple star architecture with a C&C server in the middle, it is used for sending spam emails. On occasion, it is used for DDoS attacks.<\/p>\n Read: What are DDoS attacks?<\/a><\/em><\/p>\n <\/p>\n Also known as Zbot, Zeus is a type of trojan horse that runs on Microsoft Windows that was first identified in July 2007 when it stole information from the United States Department of Transporation. It is the base of many of today’s banking trojans targeting PCs. It can be used for many criminal tasks such as stealing your banking\u00a0information. It does this by man-in-the-browser keylogging. It also has the ability to grab information from auto-saved forms (typically found in browser to fill out\u00a0contact information more easily).<\/p>\n Other famous feats is that it had compromised the FTP accounts of many well known comapnies such as Oracle, ABC, Bank of America, CISCO, Amazon, and more. It is also currently used in tech support scams which occur when pop up messages appear on your computer claiming that there is a virus on there – when in reality there are no viruses at all.<\/p>\n How the man-in-the-browser attack works<\/em><\/a><\/p>\n Definition: What is keylogging<\/em><\/a><\/p>\n <\/p>\n Criminals who deploy Chanitor malware have one aim – to steal data from their victims. Also known as Hancitor, it is merely a stepping stone for other potent malware. It does this by PowerShell and API abuse methods which are generally uncommon techniques.<\/p>\n <\/p>\n Typically infecting Asian nations, it compromises web browsers. When you go to authentic banking portals, in uses a web inject to show fake web pages. It is also known as Zusy or Tiny Banker. It’s called ‘tiny’ because the size of the actual banking trojan itself is only 20kb.<\/p>\n A new variant of Tinba has been found. Dubbed ‘Tinbapore’ due to its origins, its goal is to target financial institutions in the Asia Pacific region. However it has also targeted African, European, and Middle Eastern financial institutions.<\/p>\n The Tinbapore version employs a DGA (Domain Generation Algorithm). By using a DGA, it is almost unstoppable as it gives it the ability to come back to life even after a C&C server is taken down, thus putting millions of dollars at risk.<\/p>\n <\/p>\n This famous ransomware variant is part of the CryptoLocker family. Cryptowall is spread by email phishing campaigns<\/a> and malvertising. Unfortunately there is no decrypt key publicly available for for Cryptowall victims which is why prevention is better than cure.<\/p>\nThe Malware Family\u00a0‘Most Wanted List’ 2016<\/h1>\n
1. Conficker<\/h2>\n
2. Sality<\/h2>\n
3. Locky<\/h2>\n
\n
4. Cutwail<\/h2>\n
5. Zeus<\/h2>\n
6. Chanitor<\/h2>\n
7. Tinba<\/h2>\n
8. Cryptowall<\/h2>\n