ESET researchers have analyzed a broad family of this malware and its modus operandi.
SINGAPORE, Dec. 17, 2014 /PRNewswire/ — ESET® research team from Canada has analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has infected at least 40-thousand systems in the last few months primarily targeting European countries. ESET’s security research team has prepared an extensive white paper presenting all the findings of the investigation and analysis of the malware behavior together with a blog post and these are now available on WeLiveSecurity.com.
ESET’s telemetry detects TorrentLocker as Win32/Filecoder.Dl, its name was derived from the registry key used by the malware to store configuration information with the fake name of "Bit Torrent Application" in the beginning of the evolution of this filecoder.
This family of ransomware encrypts documents, pictures and other files on a user’s device and requests ransom to get back access to their files. Its typical signature is paying ransom solely in crypto-currency — up to 4.081 Bitcoins (EUR1180 or US$1500). In the last campaigns, TorrentLocker has infected 40-thousand systems and encrypted more than 280 million documents in targeted countries mainly from Europe, but also addressing users in Canada, Australia and New Zealand. Out of these cases only 570 victims paid the ransom, which has earned the actors behind TorrentLocker the amount of US$585,401 in Bitcoins.
In the white paper, ESET researchers have observed and analyzed seven different ways of spreading of the TorrentLocker. According to ESET’s telemetry, first traces of this malware are dated to February 2014. The malware is constantly developing and its most advanced version has been operating since August 2014.
"We believe the actors behind TorrentLocker are the same as those behind the Hesperbot family of the banking Trojan malware," said ESET Canada researcher, Marc-Etienne M. Leveille. "Moreover, with TorrentLocker, the attackers have been reacting to online reports by defeating Indicators of Compromise used for detection of the malware and changing the way they use Advanced Encryption Standards (AES) from Counter mode (CTR) to Cipher block chaining mode (CBC) after a method for extracting the key stream was disclosed." This means that TorrentLocker victims can no longer recover all their documents by combining an encrypted file and its plain text to recover the key stream.
So how does the infection spread? Victims receive spam e-mail with malicious documents and are then led to open the enclosed file — attached are mostly unpaid invoices, tracking of packages or unpaid speeding tickets. The credibility of the e-mail is increased by mimicking business or government websites in the victim’s location. If the victim is from a different country, it will redirect to the Google Search page. "To fool the victims, the attackers have even inserted CAPTCHA images to create a false sense of security," explains Leveille.
More information about the TorrentLocker ransomware is now available on ESET’s security news website WeLiveSecurity.com. Blog introducing the research and the malware is available here: http://www.welivesecurity.com/2014/12/16/torrentlocker-racketeering-ransomware-disassembled-by-eset-experts/. The detailed white paper is available here: http://www.welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf .
ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. By obtaining the 80th VB100 award in June 2013, ESET NOD32 technology holds the record number of Virus Bulletin "VB100" Awards, and has never missed a single "In-the-Wild" worm or virus since the inception of testing in 1998. In addition, ESET NOD32 technology holds the longest consecutive string of the VB100 awards of any AV vendor. ESET has also received a number of accolades from AV-Comparatives, AV-TEST and other testing organisations and reviews. ESET NOD32® Antivirus, ESET Smart Security®, ESET Cyber Security® (solution for Mac), ESET® Mobile Security and IT Security for Business are trusted by millions of global users and are among the most recommended security solutions in the world.
ESET recently updated its two-factor authentication (2FA) application, adding a secure validation to weak and static user passwords.
This updated version of ESET’s 2FA application provides flexibility and deeper integration of 2FA into bespoke applications, making it the best cost-effective solutions for SMBs everywhere.
The Company has global headquarters in Bratislava (Slovakia), with regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore; with offices in Jena (Germany), Prague (Czech Republic) and Sao Paulo (Brazil). ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Kosice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia) and an extensive partner network for more than 180 countries. More information is available from the ESET Press Center.