ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Max Steel 2016 HC HDCAM UnKnOwN
View Torrent Info: Allied 2016 HDCAM x264 AC3 HQMic-CPG
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
Hot torrents
XVID DIVX
View Torrent Info: The Fight Within.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Spectral.2016.HDRip.XviD.AC3-EVO
View Torrent Info: The.Disappointments.Room.2016.DVDRip.XviD.AC3-EVO
View Torrent Info: All.We.Had.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: David.Brent.Life.on.the.Road.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Blood.Father.2016.1080p.BluRay.DTS.x264-ETRG
View Torrent Info: Imperium.2016.1080p.BluRay.DTS.x264-ETRG
View Torrent Info: Suicide.Squad.2016.EXTENDED.1080p.BluRay.DTS.x264-ETRG
Hot torrents
Television
View Torrent Info: Ash.vs.Evil.Dead.S02E10.WEBRip.X264-DEFLATE[ettv]
View Torrent Info: UFC 206 PPV Holloway vs Pettis HDTV x264-Ebi [TJET]
View Torrent Info: Saturday.Night.Live.S42E09.John.Cena.Maren.Morris.WEBRip.x264-FUM[ettv]
View Torrent Info: Ghost.Adventures.S13E11.Zalud.House.HDTV.x264-SPASM
View Torrent Info: Mohenjo Daro (2016) HQ 1080p Blu-Ray x264 ATMOS 7.1 ESub -DDR
View Torrent Info: Befikre (2016) - 720p - DesiSCR - x264 - AC3 - [DDR]
View Torrent Info: Morgan.2016.1080p.BRRip.x264.Turkish.AC3-ETRG
View Torrent Info: Rustom (2016) HQ 1080p Blu-ray x264 Atmos 7.1 ESub -DDR
30s
Chat
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is 54.146.176.35.   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > New Ransomware Hides inside Tor from Security

New Ransomware Hides inside Tor from Security

New Ransomware Hides inside Tor from Security

Added: Saturday, August 2nd, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
According to security experts at Kaspersky Lab, a new strain of ransomware emerged. Dubbed “Onion”, the malware uses Tor to hide and to make it hard to track the hackers behind the campaign.
Screen_Hunter_03_Aug.jpg

Ransomware is spreading across the globe. Another malware representative is a successor to the well-known Cryptolocker: when infected, it would scan your machine for important documents, particularly Microsoft Office files and pictures and encrypt them with a secret key to later demand payment from you.

The ransom the virus claims is high – normally several hundred dollars – and demanded in Bitcoin. However, many users did comply and paid up trying to retrieve their files. A few months ago, even a US police force had to pay a ransom of $1,338 to get their documents back.

As for Onion, it works in a similar way: once a machine is infected, it encrypts your files, just like Cryptolocker does. Then it initiates a countdown to warn you that you have only 3 days to pay up or lose your files forever. The difference between Cryptolocker and Onion (which researchers think originates from Russia) is in the way how it communicates with the “command and control” server which accepts the payment and, if the hackers decide to keep their word, releases the decryption codes.

Onion communicates using Tor – the anonymizing service encrypting communications known worldwide. The malware then bounces them via a series of relay nodes to cover its traces and hide where the connection originated. Onion so far only affects computers running Windows, but it is far not the first malicious software to use Tor to hide its trail. For instance, the banking malware Zeus, seen in the wild in the first half of 2013, was also using the anonymizing network.

Now security researchers at Kaspersky Lab admit that Tor has become a proven means of communication and is being widely used by other types of malware. They also point out that the Onion malware has some technical improvements on previous cases where Tor functions were used in similar campaigns. Apparently, hiding the command and control servers in Tor network largely complicates the search for the cybercriminals. In addition, using an unorthodox cryptographic scheme makes file decryption virtually impossible, even if the security experts manage to intercept traffic between the malware and the server.

These features make Onion a highly dangerous threat. The experts recognized the ransomware one of the most technologically advanced encryptors existing at the moment. In addition, the use of Tor leaves cybersecurity experts with fewer options for fighting the ransomware. While Cryptolocker could be halted temporarily by a concerted effort to take down the servers controlling it, Onion’s commands originate from a darkweb server, so it is impossible to trace them back to somewhere.

Kaspersky lab recommends everyone to make sure their antivirus software is regularly updated and keep regular backups in case Onion finds its way onto their PC.


Posted by:  SuperAdmin
Date:  Saturday, August 2nd, 2014



Comments (9) (please add your comment »)

1
posted by (2014-08-02 23:23:27)
Pympjuice avatarWhat difference would it make if your pc has anti malware software on it? I have an exception in my antivirus software to exclude areas from detection; typically the downloads folder where torrents are stored. How can I protect myself from this ransomware, while keeping my exclusions in place? Or should I delete all exclusions then deal with my antivirus software warning me every time I download a file?

2
posted by Trusted Uploadermen (2014-08-03 05:25:23)
Jooge avatar@Pympjuice - Just use a Linux OS. Window is crap.

3
posted by Kitty (2014-08-03 12:26:01)
hijiri2 avatarDon't sweat it! just keep regular backups of your stuff !!

4
posted by (2014-08-03 17:31:50)
rakikulkarni avatar@Pympjuice I agree 100% with you.

5
posted by (2014-08-03 20:46:15)
Turbowater avatarTOR is not remotely secure.

6
posted by (2014-08-03 23:25:14)
cggc avatarSome confusing drivers what windows said to me made dark screen monitor while windows update trying to be screensaver until boot and while windows install too if searching reviews killing me thinking how windows are! and,Tor maybe can't get windows to encrypted and use dark web server to make windows work correctly online within making antivirus rules to turn off making freezes and finally,Linux with Ubuntu don't work for me if I don't erase amazon Why? online reviews said for fix so how maintain if Ubuntu drivers are like programs together and 2nd finally maybe Tor work for now in working just native Linux pc devises!

7
posted by (2014-08-04 00:39:07)
No avatarTor is CIA/NSA. Same with cryptolocker malware,
Because if it were not the same evil empire agencies would be on to them like a tone of bricks.

8
posted by (2014-08-04 03:13:39)
KingTubby avatarlinux based OS is the way to go... i gave up on micro$oft a long time ago...

9
posted by (2014-08-06 07:38:21)
Darkan9el avatarLinux Live and a USB Drive is pretty good, but I think all these things are being created to discredit Tor, make it seem like the bad guy in all of this. All you need to do is plant the seed of doubt and watch it grow, plus the black ops people earn a bit of money for their time.



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc3