Indian security watchdog warns of 'CryptoLocker' ransomware

Advertisement
By Press Trust of India | Updated: 4 December 2013 17:36 IST
Cyber security sleuths have warned Indian Internet users against a potent Trojan virus in the social media and email circuit which stealthily encrypts important documents of the user and then asks for a 'ransom' to unlock proprietary messages.

The audacity of the virus has been categorised as "severe" and cyber experts say such a malicious programme has been detected for the first time which asks for a ransom of an estimated Euro or USD 300 to unlock the genuine files of a user through "anonymous pre-paid cash vouchers".

Once activated in the user's email or in the operating system, the virus jeopardises the overall security of the user's classified information.

The number of incidents, perpetrated by the virus called 'CryptoLocker', however, are low in India at present.

Advertisement

"An advisory has hence been issued to stop its prevalence and multiplying capability in Indian cyberspace," an expert cyber cop said.

Advertisement

The notorious malware has got as may as seven aliases to hide its original character in the cyberspace.

"It has been observed that the variants of malware family Win32/Trojan. CryptoLocker are spreading widely. CryptoLocker is spreading via malicious hyperlinks shared via spam emails, social media, malicious email attachments (fake FedEx and UPS tracking notices), drive-by-download or as a part of dropped file from other malwares.

Advertisement

"CryptoLocker encrypts files located within local drives, shared network drives, USB drives, external hard drives, network file shares and even some cloud storage drives using RSA public-key cryptography (2048-bit), with the private key stored only on the malware's control servers," country's premier cyber security agency-- Computer Emergency Response Team-India (CERT-In) said in its latest advisory to Internet enabled computer users.

"The virus goes on to 'disable' infected system functioning and displaying message to user informing that files are encrypted and later demands payment against decryption key in order to decrypt the files, 300 USD or Euro

Advertisement

through an anonymous pre-paid cash voucher (i.e. MoneyPak or Ukash), or 2 Bitcoin," it said.

Once a gullible Internet user makes the payment, the advisory said, the time limit is around 72-100 hours and then the private key (of the user) is destroyed on the server.

"Payment of the ransom allows the user to download the decryption program, which is pre-loaded with the user's private key," it said. The Trojan downloads encryption key by making a network connection to server names having the extensions like .biz, .co.uk, .com, .info, .net, .org and .ru. The agency has suggested some counter measures to keep systems safe from the virus attack which include steps like not downloading and opening attachments in emails received from untrusted users or unexpectedly received from trusted users.

"Exercise caution while visiting links to web pages, protect yourself against social engineering attacks, do not visit untrusted websites, enable firewall at desktop and gateway level and disable ports that are not required, avoid downloading pirated software, keep up-to-date patches and fixes on the operating system and application software's and keep up-to-date antivirus and antispyware signatures at desktop and gateway level," the advisory issued to Internet users said.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Nothing CEO Carl Pei Announces March 5 Event
  2. Realme P4 Power Review
  3. Samsung Galaxy S26 Ultra Could Launch With This Selfie Camera Upgrade
  4. Vivo V60 Lite 4G (2026) Debuts With Updated Snapdragon Chipset
  5. Anthropic, Infosys to Join Hands to Build Agentic AI Tools for Enterprises
  6. Infinix Note 60 Ultra Appears in FCC Listing; Renders Reveal Second Display
  7. Lava Bold N2 Launched in India With a 5,000mAh Battery at This Price
  8. Xiaomi 17 Series Leak Hints at Imminent Launch Ahead of MWC at These Prices
  9. Infinix GT 50 Pro Design, Key Specifications Revealed in New Leak
  10. Apple Music Could Soon Let You Generate Playlists Using Apple Intelligence
  1. Samsung Galaxy F70e 5G With 120Hz LCD Screen, Dimensity 6300 SoC Goes on Sale in India: Price, Offers
  2. Hackers Send Physical Phishing Letters Impersonating Trezor and Ledger to Trick Users
  3. Infinix Note 60 Ultra Battery Details Revealed by US FCC Listing; Leaked Renders Hint at Secondary Display
  4. Android XR OS Reportedly Leaks in Early Screenshots; to Offer Clean Spatial Interface, ‘Glimmer’ Design
  5. iOS 26.4 Beta 1: Apple Music Gets New AI-Powered Playlist Playground Feature
  6. India AI Summit: Anthropic, Infosys Announce Partnership to Bring Agentic AI Solutions for Enterprises
  7. Valve Says Steam Deck OLED Is Out of Stock Due to RAM and Storage Shortages
  8. AI Impact Summit: India Expected to Witness Over $200 Billion Worth of AI Investments, IT Minister Says
  9. Adani Group Announces $100 Billion Plan for Hyperscale AI-Ready Data Centres by 2035
  10. Infinix GT 50 Pro Design Leaked, Specifications Might Include Dimensity 8400 Ultimate Chip
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.