Hackers have begun deploying ransomware, a type of malware that holds files and servers hostage in exchange for payment.
What you need to know about ransomware, hackersâ€™ latest trick to take over your computer and blackmail you for cash.
Youâ€™ve just opened a Web page or clicked a link in an email when your computerâ€™s desktop goes gray. A browser window pops up with the FBI logo in the top left corner. Below it is a live webcam feed with a picture of someoneâ€™s face. You try to click away but find that your browser is locked. With a start, you recognize the face staring at you from the screen: Itâ€™s you.
This isnâ€™t the plot of a Japanese horror film. Itâ€™s a frightening form of malware called â€œransomwareâ€ that has been seen with increasing frequency in recent months. No one knows exactly how many people have been hit with it, but security firm McAfee reports that it recorded more than 120,000 new samples in the second quarter of 2012, a fourfold increase from the same quarter last year.
There are many variants of ransomware, all of which begin by locking you out of your own machine. The next phase: trying to blackmail, intimidate, or otherwise spook you into forking over cash. You probably shouldnâ€™t do it. But itâ€™s easy to see why a lot of people do.
The version I described in the first paragraph is the product of a virus called Reveton, which you can contract either by clicking a malicious link or visiting an infected website, which triggers an automatic download. Beneath the video feed, which registers the surprise on your face as you recognize yourself, are your computerâ€™s IP address and hostname and an urgent message: â€œYour computer has been locked!â€ Scroll further and youâ€™ll find yourself accused of possessing illegally downloaded files in violation of federal copyright laws. (A new iteration claims that youâ€™re in violation of SOPA, the Stop Online Piracy Actâ€”which, as serious netizens know, never actually became law.)
The crime, youâ€™re told, is punishable by a fine or up to three years in prison. Thereâ€™s only one way to unlock your computer, according to the warning on your browser, and thatâ€™s to pay up. And if you donâ€™t pay the specified â€œfineâ€ within 48 or 72 hoursâ€”often by purchasing a prepaid cash card such as Green Dotâ€™s Moneypak, which makes the transaction hard to traceâ€”it claims that youâ€™ll be locked out of your machine permanently and face criminal charges to boot.
The criminal charges are bogus, of course, but the threat of being permanently locked out of your files is real, says Chet Wisniewski, senior security adviser at the data-security firm Sophos. Some victims have reported that, after a certain amount of time passed, their files were in fact deleted. On the other hand, itâ€™s unclear whether paying up actually helps, or if it just prompts the bad guys to try to squeeze more out of you. One thing security experts do know is that the scam appears to be automated. It would be a mistake to assume thereâ€™s an actual human on the other end whom you can persuade to take it easy on you because you really, really need those files.
Other types of ransomware do without the webcam scare tactic but ratchet up the stakes in other ways. Sophosâ€™ Graham Cluley told me that his friendâ€™s elderly parents were hit by a version that claimed to have found child pornography on their computer. They knew they hadnâ€™t downloaded any such thing. Still, they were tempted to follow the instructions on screen rather than face the mortification of explaining the situation to their children or the police.
These scams represent an evolution from earlier forms of ransomware that made plain their creatorsâ€™ criminal intentions. One variant reported by Sophos in 2010 would encrypt the usersâ€™ files, change their desktop wallpaper to an alert message, and then display a text file ordering them to send a $120 wire transfer to a Swiss bank account in exchange for instructions on decrypting their files. The alert warned users, â€œDonâ€™t try to tell someone about this message if you want to get your files back!â€
The scare tactics are clearly working. McAfee highlighted ransomware as one of the top malware trends in its latest quarterly threats report, noting that it seems to be replacing â€œfake AV,â€ or fake antivirus programs, as the scam du jour. (Fake AV reports peaked in mid-2011.) And Brian Krebs of the blog Krebs On Security got his hands on data from a ransomware scam in France that showed that, on one particular day, 2,116 PCs had been infected. Only 79 of the victims actually paid, but at $100 apiece, they provided a good haul for the hackersâ€”especially considering they were doubtlessly running the same scam in many other countries.
What the ransomware wave demonstrates is that as the average computer user becomes wise to old tricks like the Nigerian email scam, criminal hackers will develop more sophisticated schemes. â€œHacktivistâ€ groups such as Anonymous and LulzSec get more press with their flashy denial-of-service attacks and password leaks targeting major corporations and government websites. But sprawling criminal networks, many with roots in Eastern Europe, quietly prey on individuals around the world on a daily basis.
So what should you do if youâ€™re unwary and unlucky enough to contract a ransomware Trojan? First, instructs Sophosâ€™ Paul Ducklin in a helpful video, donâ€™t panic and donâ€™t do anything rash. Once the malware has control of your machine, chances are that most of the damage has already been done. (In theory the hackers could mine your files for private information, but in practice they rarely do. Too much effort for an uncertain reward.) And ignore those threats not to tell anyone about the attack. Unless youâ€™re an expert yourself, itâ€™s absolutely a good idea to enlist the help of a computer security expert to help you figure out how to handle it. Thereâ€™s a chance that an antivirus program could do the trick, but in most cases, youâ€™ll have to reinstall your operating system from the ground up. The FBIâ€”the real FBIâ€”also recommends filing a complaint at www.ic3.gov.
As with most forms of malware, the best protection here is simply to avoid visiting compromised websites or clicking on any suspicious-looking links, whether on the Web or in emails, Twitter or Facebook messages, or even (lately) Skype messages. Keeping your operating system and apps updated with the latest security patches always helps, and antivirus software can be an additional prophylactic. But this particular type of attack also reinforces the importance of backing up your files. Otherwise, you might never see them again.
Itâ€™s conceivable, some security types admit privately, that paying up could prompt the criminals to restore them. But the official advice is that you never should, and in most cases thatâ€™s the advice that makes the most sense. Once the hackers have your money, thereâ€™s little incentive for them to restore your files. And seeing that theyâ€™ve found a sucker, they might come right back and target you again.