The Crypto Virus
one of the most popular instruments for cyber criminals

Learn all about the crypto virus.

Get a FREE TRIAL and protect your company against crypto viruses
and other ransomware

CEO fraud, phishing and crypto viruses are some of the most popular attacking methods that cyber criminals increasingly prefer. This is particularly the case with attacks on companies. The assailants are quite creative when it comes to converting their malicious proceedings into money.

This was impressively demonstrated by the recent attacks of Petya, WannaCry and Jaff. Amongst others, public institutions, such as British hospitals, were directly affected by polymorphic crypto viruses.

The same applies to large corporations, such as the pharmaceutical company Merck, various car manufacturers and telecommunication providers, who have also been victims of these blackmail trojans. In the end, however, it also affected smaller companies.

Related Topics:

  1. How Cryptotrojans endanger the existence of companies
  2. Attack of the encryption trojan Bad Rabbit
  • Select the number of email mailboxes you have in your company.
  • This field is for validation purposes and should be left unchanged.

All you have to know about the crypto virus:

This is how clever the attackers proceeded during the crypto virus Locky

Professional cyber criminals are quite ingenious when it comes to the infiltration of targeted systems. Even though many ransomware attacks, which are sent via email to the system, can be detected through specific characteristic like a faulty orthography. But not all cyber criminals are that negligent. This is why the attackers used a clever pretence for the crypto virus Locky, which a company employee would not associate with a ransomware attack, as the malware was disguised as an application.

 

The perpetrators used ordinary names and thus behaved very inconspicuously. The same applied to the composition of the applications as well as the other attachments, such as the photos of the seeming applicants. Crypto virus Locky hid itself in an inconspicuous ZIP file in the email attachment. Once opened, the attachment unfolded its full effect and carried out the encryption of the affected system. At this time, the users had only a restricted or no access at all to the files. The crypto virus specifically infiltrated individual systems and even encrypted entire networks.

The crypto virus locky in a new form

In 2016 one could observe the ability of the crypto virus Locky within a short time, as the distribution took place very quickly. In this case, the cyber criminals showed their creative power: . The attackers used an invoice in the file attachment as a pretence. The demand and the invoice, which had been stated in the email, seemed convincing enough.

 

The activation occurred via a simple double mouse click. This started the process ofloading the Trojan to the target system through a disguised code and the encryption through the crypto virus began. Immediately after that,, the ransom demand was made through a program window.

 

The files of the affected parties could only be restored by a backup. There was no other possibility at that time. The problem lied in the various versions of the crypto virus Locky , for which no universal decryption key existed.. What’s more, the quality of the email content has steadily increased , so that these appeared very authentic.

The victims of a crypto virus are usually deceived

The users of the infected systems were offered a decryption of the files by purchasing a decryption software especially adapted to the user, This method can be seen as a ransom demand. The approach is common practice for cyber criminals who perform a ransomware attack. Even when the decryption software is received, it is not guaranteed that the user can access his data again. For this reason, IT professionals recommend not to pay the ransom.

State institution as decoy for the crypto virus

At a later stage of the attack wave, the crypto virus Locky reached its peak. The senders no longer just used companiy names, but also the names of official institutions such as The Federal Criminal Police Office. The email pretended tohave attached a security software . with whichthe ransomware could be completely removed on the affected computers. The file was, however, the attached Trojan horse, which is ultimately the access to the crypto virus. Even this approach of the perpetrators was successful.

i
Request a quote!

Would you like to find out how much Hornetsecurity Advanced Threat Protection costs? Then ask us for a no-obligation quote now. You can also try out our service for 30 days free of charge. Simply make use of our fully automated onboarding option.

Request a quote

Try out our product now!

By providing just a few details, you can also try out Advanced Threat Protection right now for 30 days with no obligation. Simply create an account and in just a few minutes your employees and IT systems will enjoy additional protection.

Onboarding – try out the product

A selection of our more than 30,000 customers

[cloudslider id=”11″]

More Cloud Security Services of Hornetsecurity

365 Total Protection (NEW)

365 Total Protection from Hornetsecurity offers comprehensive protection for Microsoft cloud services – specially developed for Office 365 and seamlessly integrated.

Spam and virus filter

Safeguard your email communications and protect your inbox from unwanted messages. In the simplest possible way without having to give up control.

Email encryption

The low-cost automatic email encryption service protects incoming and outgoing emails against phishing and fraud.