• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Cyber crooks' use of 'Police Virus' ransomware on the rise

Trojan threat also evolving, warns PandaLabs report

Malware security threat
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 07 August 2012
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Cyber criminals are now using the infamous ‘Police Virus' malware as fully functioning ransomware, according to a report from security firm PandaLabs.

The Police Virus is a common technique used by criminals to infect computers by masquerading as law enforcement agencies demanding money for fictional crimes.

Scams have been detected across the globe demanding money for copyright infringement, missed court dates and even parking tickets.

PandaLabs warned that it had detected the evolution of the scam from standard scareware to ransomware in its latest quarterly threat report, which analysed incidents from April through June 2012.

The firm went on to warn that the campaigns are continuing to evolve at a rapid pace, with criminals creating increasingly effective ways to hold users data to ransom and demand payment for its safe return.

"The first versions of the new Police Virus only encrypted .doc files, and the encryption wasn't too hard to crack, so it was possible to decrypt the files without the key," read the report.

"Now, however, a more sophisticated encryption is being used, and the decryption key is required to unlock the files. And not only that, the files are encrypted with a different key for each infected computer, so, unless you are able to access the server that stores all keys, it is absolutely impossible to access the files."

The evolution came alongside a boom in the number of Trojan viruses targeting the world. The report revealed that Trojans are now the most common form of cyber attack, accounting for 79 per cent of all threats.

Worms were the second biggest threat detected, being responsible for 11 per cent of all attacks.

Trojans continued to prove the most effective attack method during the quarter speaking for 76 per cent of all infections, while viruses came second accounting for eight per cent.

"It is interesting to note that worms have only caused six per cent of infections despite accounting for almost 11 per cent of all new malware", said Luis Corrons, technical director of PandaLabs.

"The figures corroborate what is well known: massive worm epidemics have become a thing of the past and have been replaced by an increasing avalanche of banking Trojans and specimens such as the Police Virus."

Looking to the future Corrons warned that the scam is one of the numerous cyber crime kits currently on sale and will likely remain an ongoing problem in the foreseeable future.

"This so called ‘Police Virus' appears to be created for and distributed by a cyber criminal gang from Eastern Europe or Russia, and police forces from across Europe are working together to try and identify and arrest them," said Corrons.

"But this is something that takes a long time and huge amount of effort, which is not immediately obvious when we only see the headlines after months or years of investigations."

PandaLabs findings follow on from earlier warnings by Microsoft's Trustworthy Computing and Finnish security firm F-Secure, both of which reported a boom in ransomware attacks earlier in July.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Privacy
  • malware
  • cyber-crime
  • Hacking
  • Hacktivism
  • antivirus

V3 Latest

Hacker with laptop
Oracle MICROS hack claims more victims

Five more firms caught up in huge attack

  • Security
  • 12 August 2016
oneplus-3-review-main
OnePlus 3 review

The OnePlus flagship goes invite-free for 2016

  • Mobile Phones
  • 12 August 2016
Text entry on WatchMI platform
Researchers show off pressure-touch and movement control tech for wearables

University of St Andrews researchers could have opened up a whole new world for wearables

  • Gadgets
  • 12 August 2016
volkswagen
Wireless hack flaw puts 100 million VW cars at risk

Car maker says 'there is no 100 per cent guarantee for security'

  • Security
  • 12 August 2016
blog comments powered by Disqus
Back to Top

Most read

Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
oneplus-3-review-main
OnePlus 3 review
Hacker with laptop
Oracle MICROS hack claims more victims
credit-card
Oracle hack potentially compromises almost every US credit card
Microsoft Windows XP boxes on the assembly line in 2001
Windows XP: 7 reasons ancient OS refuses to die
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016