All the latest UK technology news, reviews and analysis

Evolved Police Virus ransomware holds user data hostage

31 Jan 2013

Security firm AVG has uncovered a new more dangerous version of the infamous Police Ransomware capable of fully encrypting all data stored on an infected machine.

The new Police Virus variant is more dangerous than most in that it can actually make good on previous versions' idle threat to encrypt users data if they did not pay the blackmailer.

"So far we've seen documents, images and even executable files affected by the encryption. Windows system files are excluded from this encryption process so your system won't stop working but many third party programs will, not to mention the loss of your personal data," warned AVG researcher, Hynek Blinka.

"This particular malware also disables regedit, task manager and msconfig to make the life of the victim even harder. However encrypted personal data which you simply cannot use is definitely bigger problem here."

The Police Virus is one of many active ransomware attacks currently active. Ransomware is a form of malware that dupes its victims by masquerading as a message from a legitimate law enforcement agency demanding money for fictional crimes.

Numerous examples of ransomware have been discovered across the globe pretending to be from a variety of organisations, including the FBI and the UK's Metropolitan Police force.

The malware is spread in a variety of ways, including as a malicious web link, infected file and even at times as a drive by download.

Criminals' use of ransomware has been a growing problem in the world of cyber security for some time.

Prior to the new Police ransomware variant's discovery Panda Security had detected a marked increase in the number of ransomware scams operating throughout 2012.

The firm warned the problem would only get worse in 2013 if appropriate action was not taken.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

Work location poll - office, remote or home?

Where do you spend most time working on your primary work device?

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Beacon technology: what are the opportunities and how does the technology work?

This paper seeks to provide education and technical insight to beacons, in addition to providing insight to Apple's iBeacon specification


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

IT Security Analyst (Cyber, Wireshark, SIEM)

IT Security Analyst (Cyber, Wireshark, SIEM) Why apply...

Systems Operations Supervisor

Our Client is seeking an Operations Systems Analyst/Supervisor...

Project Manager / Technical Project Manager - (Prince 2, ERP, MS Project, ISO, PPI)

Project Manager / Technical Project Manager - (Prince...

Software QA Tester - No.1 Online Video Gaming Tech Provider

Software QA Tester - No.1 Online Video Gaming Tech Provider...
To send to more than one email address, simply separate each address with a comma.