ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Allied 2016 HDCAM x264 AC3 HQMic-CPG
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
Hot torrents
XVID DIVX
View Torrent Info: The.Disappointments.Room.2016.DVDRip.XviD.AC3-EVO
View Torrent Info: All.We.Had.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Burn Country.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Frank.And.Lola.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Finding.Dory.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Finding.Nemo.2003.BluRay.720p.DTS.AC3.AAC.x264-ETRG
View Torrent Info: Hillsong.Let.Hope.Rise.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: The Light Between Oceans (2016) 720p WEB-DL - 1.2GB - ShAaNiG
Hot torrents
Television
View Torrent Info: The.Grand.Tour.S01E04.WEBRip.X264-DEFLATE[ettv]
View Torrent Info: DCs.Legends.of.Tomorrow.S02E08.HDTV.x264-LOL[ettv]
View Torrent Info: Supernatural.S12E08.HDTV.x264-FUM[ettv]
View Torrent Info: Pure.Genius.S01E07.HDTV.x264-KILLERS[ettv]
View Torrent Info: Housefull 3 (2016) HQ 1080p Blu-Ray x264 DTSHD-MA 7.1 MSubs -DDR
View Torrent Info: AE DIL HAI MUSHKIL (2016) HEVC x265 10 Bits DvDRip AAC 5.1 ESub -DDR
View Torrent Info: Madaari (2016) 1080p Blu-Ray HEVC 10 Bits AC3 5.1 ESub -DDR
View Torrent Info: The Devil\'s Double (2011) 720p BluRay x264 Eng Subs [Dual Audio] [Hindi DD 2.0 - English 2.0] Exclusive By -=!Dr.STAR!=-
30s
Chat
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is 184.73.107.18.   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Ransomware Is Distributed Via Tor

Ransomware Is Distributed Via Tor

Ransomware Is Distributed Via Tor

Added: Friday, July 25th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Security experts detected a new kind of Crypto ransomware that uses Tor anonymizing network to hide its antics. The so-called “Critroni” has been flogged on underground forums for a few weeks now and is currently being used by the Angler exploit kit. The most interesting thing is that it is the first crypto ransomware that uses the Tor network for command and control.
Screen_Hunter_03_Jul.jpg

Security experts confirm that the news is bad. The current situation is the following: the ransomware landscape is ruled by CryptoLocker, and this part of code is really hard to defeat. The malware encrypts all of the files on the affected PC and demands a settlement from the victim to get the private key to decrypt the information.

Police in the US and Europe shut down the GameOver Zeus malware operation, which proved to be one of the key mechanisms the hackers needed to push CryptoLocker. After that, security researchers ran into adverts for the Critroni ransomware, which is also known as CTB-Locker, first used in the Russian Federation.

The code is currently sold for $3,000 and security researchers confirm that it is now being used by a number of attackers, with some of them using the Angler exploit kit to drop a spambot on users’ computers.

Once on your computer, Critroni encrypts various files, including pictures and documents, and then displays a dialogue box that informs you of the ransomware and demands a payment in exchange to the key to decrypt the files. Normally, victims are given 3 days to pay up the ransom in Bitcoins. The demanded amount is something about $300, for victims in the United States, Canada and Europe.

This particular breed has the unique and interesting feature: it uses the C2 function hidden in the Tor network for its command-and-control infrastructure. According to Fedor Sinitsyn, senior malware analyst at Kaspersky Lab, they found out that the executable code for establishing Tor connection is embedded in the ransomware’s body. The experts had to admit that embedding Tor functions in the malware’s body is not easy from the programming point of view. However, this feature helps Critroni or CTB-Locker avoid detection.

It should be noted that Critroni has been spotted in English and Russian, so the suggestions are that countries using the languages will be first to suffer.

Posted by:  SuperAdmin
Date:  Friday, July 25th, 2014



Comments (5) (please add your comment »)

1
posted by Kitty (2014-07-25 23:10:37)
hijiri2 avatarSolution don't use Tor on computers you use for work or business . Use it on that old laptop you have full off stored porns and crap !! Make backup of all that stuff ...And if you get that ransomware lock sh1t,,, format your HD and restore backup ...

2
posted by men (2014-07-26 06:26:12)
ZerlindaX avatarBest real solution is to always backup your drive. Believe me,
I've learned the hard way from the late 80's and 90's when virus
back then use to wipe your whole hard drive clean. Looks like
it's gonna be months before the experts break the the executable
code for this bad baby.

3
posted by Blocked (2014-07-26 08:02:35)
No avatar@hijiri2:

Did you read the article, or just the headline? It has nothing whatsoever to do with having TOR on your system: the malware contains the code to connect itself to the TOR network. Even people who've never heard of TOR can get this ransomware on their c

4
posted by (2014-07-26 16:21:27)
CCC avatarI agree backup. I reformat 2x a year regardless.

PS. Nice pick (Capone)

5
posted by (2014-07-31 03:18:22)
No avatari;ve got lucky a few time as soon as I see that ransome ware come on my screen I immediately shut down my pc ; then go back on in a couple minutes and I do not restore my previous session with google chrome and start fresh ; I;m running Panda Cloud antivirus plus Zemane antimalware and anti keystroke logger ; i;ve backed up all my photo files on a external drive and only run it when i;m doing some photo work or copying files or movies or photos too it ; one needs not to run an external drive with all your files if surfing the net as it can be screwed up by this ransom ware ; i';d like to find these guys and tie them to a tree spread honey on them release a hive of bees on them



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc2