11-26-2013 04:58 PM
The cyber-gang running the CryptoLocker extortion racket is sharing a big cut of any payments they squeeze out of their victims with criminal botnet owners working closely with them, says Symantec, which has been monitoring this underworld activity online.
The CryptoLocker gang, believed to be mainly Russian-speaking, created the malware that makes use of strong encryption to lock up the victim’s electronic files until the victim pays a ransom, which typically starts at least $150 to get the key to unlock their scrambled files. The gang itself is paying criminal botnet owners operating vast command-and-control systems of compromised computers to distribute CryptoLocker as a dangerous attachment in spam, says Liam O’Murchu, manager of security response operations at Symantec. In addition to spam distribution, which relies on the victim opening the malware-laden attachment to spread CryptoLocker, the gang is willing to pay a botnet owner as much as 75% of any extortion money they can get from victims if the botnet owner directly drops CryptoLocker onto a compromised machine it already controls.
Webroot® SecureAnywhere™ Internet Security Complete Beta Tester v184.108.40.206 on my main system Alienware 17R2 with Windows 10 Professional x64 Version 1703 (Build 15063.296) & Motorola Moto Z Android 7.0 Nougat with WSA Mobile Complete v220.127.116.1160 which is full Cloud now as well! I also test new Windows Insider 32bit & 64bit builds on Virtual Machines.
Microsoft® Windows Insider MVP - Windows Security