Wednesday, September 26, 2012

"Ransom Trojan" exploits Cryptography for Malevolent Purposes

In this sophisticated business world, cyber-crimes have become very treacherous and are stealing the crucial data by performing identity thefts, pharming, and denial of service attacks and phishing which has become more recurrent in these days. A blackmailer tenuously encrypts your files and then demands money from you to get it decode. Apart from the usual online attacks, there exists Ransom Trojan attack which are the websites that feats the virus onto the user’s PC. Trojan.Pgpcoder, uses http://www.microsoft.com/technet/security/Bulletin/MS04-023.mspx vulnerability in Microsoft Internet Explorer. These kinds of occurrences would also attack the users in the upcoming generations as it is very perilous. 

Websense, the San Diego-based Web security company has first reported this attack when a customer has become a prey for this attack. The investigators at Symantec have viewed these malevolent programs exploited in the ransom attack and Oliver Friedrichs, who is a senior manager at Symantec Security Response, claimed that these attacks exploit an email, website to allocate the Trojan.Pgpcoder and promote a widespread extortion campaign. As soon as the users view the malevolent website, then his PC would get infected within seconds and Trojan horse downloader unites with other sites and downloads. Trojan removal service would be an optimal option to stay away from such perilous viruses.

The malevolent encoding program seeks for 15 common file types, embracing Microsoft Office files and images on the PC and will encrypt it by obliterating the inventive files. It will generate a file with a ransom note referred as “Attention!!!” and demands around $200 to decrypt the desired files. But, still there subsists a weak spot in the attackers' scheme. Many criminals would hack their desired data by encrypting it and would decode it only for their use and when the PC user tries to access them, then they would find that it is in encryption process and would lose their valuable work and efforts. You can approach the Trojan removal service on this concern.

More: Why FBI Moneypak Should Be Evaded

No comments:

Post a Comment