This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

CryptoLocker copycat infects thousands of machines

Share this article:

A copycat of the CryptoLocker ransomware has recently emerged and already infected thousands of computers internationally

A copycat of the feared CryptoLocker ransomware has recently emerged and already infected thousands of computers in the US and at least six European countries.

The Locker virus, which demands US$ 150 (£92) payment from victims to decrypt their files, was discovered by US-based security research firm IntelCrawler on 12 December. The company say it began large-scale distribution on 5 December. It has an estimated 40 to 50 variants, and just one of these bots has already infected close to 6,000 machines.

IntelCrawler CEO Andrey Komarov told SCMagazineUK.com that victims have so far been identified in three US states, plus Germany, Russia, The Netherlands, Turkey, Poland and Georgia. The numbers of infections are rising.

Copies made

The malware targets computers using a variety of methods including spam and Trojan downloads. It avoids suspicion by checking the user has an internet connection via adobe.com, then makes encrypted copies of all the user's files before deleting the originals.

All the Locker variants demand a US$ 150 payment to decrypt the files via the Perfect Money payment service or a card transaction through the Russian QIWI Visa payments firm, giving users the details needed to pay the ransom by placing a CONTACT.TXT file in each of their directories.

Locker could be the forerunner of more Cryptolocker imitators – if users respond to the pressure to pay the ransom, according to cyber security expert Alex Fidgen, director at MWR InfoSecurity.

He told SCMagazineUK.com: "With the Locker malware, we're starting to see copycat ransomware spring up, mostly due to the presumed success of the CryptoLocker malware. We will only see more of this kind of malware if people pay the demands of the authors.”

Decryption possible

Fidgen advised: “The best way people can avoid having to pay is to keep their software updated against all known vulnerabilities and to adhere to best security practices so they don't get the malware in the first place. They should also keep regular backups up-to-date so that if they do get attacked there's little damage done."

The Locker malware is based on the TurboPower LockBox library of tools and uses AES-CRT to encrypt the victim's files. IntelCrawler suspects the campaign might be the brainchild of well-known spammer ‘SEVERA'.

Komarov told SCMagazineUK.com that his firm has established how to decrypt infected machines. This makes the new variant less threatening than the CryptoLocker original which was first spotted in September and which researchers are still trying to crack.

Locker can also be detected by some anti-virus systems, but Komarov warned that this will not stop the criminals behind it. He told us: “We predict new obfuscated and encrypted builds that they will update and use in the near future.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...

Cyber security still a learning curve for most companies

Cyber security still a learning curve for most ...

Poor network visibility, outdated security tools, a skills shortage and a lack of control in the cloud are just some of the reasons companies are struggling with cyber-security, say two ...

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...