User User name Password  
   
Monday 23.3.2026 / 22:31
Search AfterDawn Forums:        In English   Suomeksi   På svenska
afterdawn.com > forums > announcements > news comments > u.k. warns of computer ransom scam targeting millions
Show topics
 
Forums
Forums
U.K. warns of computer ransom scam targeting millions
  Jump to:
 
Posted Message
ddp
Moderator
_
16. November 2013 @ 00:36 _ Link to this message    Send private message to this user   
British officials issued an unusually stark alert about a cyberscam that locks users out of their computers unless they pay a ransom, saying Friday that tens of millions of people may soon be targeted.

In a warning headlined "URGENT ALERT," Britain's National Crime Agency said they were aware of a "mass email spamming event that is ongoing" and urged computer users to beware of messages purporting to come from their bank.

Tony Neate, the chief executive of British Internet safety group GetSafeOnline, said it was noteworthy that the agency ? often described as Britain's equivalent of the FBI ? had sent out such a strongly worded alert about a cyberscam.

"They're only going to do it if they think it is serious," he said in a telephone interview.

The scam targeting Britons works by tricking people into downloading CryptoLocker, a new brand of malicious software that encrypts a user's hard drive, effectively putting their photos, documents, and other data under lock and key.

A 72-hour countdown clock appears on the screen warning that the files will be lost irrevocably unless a ransom is paid, either through Bitcoin ? a tough-to-trace cybercurrency ? or MoneyPak cash cards. Ransoms tend to be $100 or $300, according to BleepingComputer, a security website that has closely tracked CryptoLocker's spread.

Users who've paid the ransom have reported that their files are decrypted within a few hours, but Britain's crime agency warned that it did not endorse the payment of ransoms to criminals and warned that "there is no guarantee that they would honor the payments in any event."
http://news.ca.msn.com/top-stories/uk-w...geting-millions
Advertisement
_
__
Senior Member
_
16. November 2013 @ 11:33 _ Link to this message    Send private message to this user   
some good info on the subject in these links.

http://readwrite.com/2013/11/08/cryptol...~onnc8DWnBZxA8H

http://blog.malwarebytes.org/intelligen...u-need-to-know/

kinda glad i keep a clone of my hard drive.back it up folks.
ps355528
Senior Member
_
20. November 2013 @ 21:59 _ Link to this message    Send private message to this user   
Brute force it.. took me 28 hours on an idiots machine.. read up on brute force public/private key encryption.. you have the public key half.. so that's more than half the battle.. Basically..

Plaintext that consists of an RSA private key can be easily recognised, because it satisfies certain mathematical properties. In particular:

d = e^-1 mod (p-1)(q-1)

This means that given the public key and a candidate d, you can calculate

d . e mod (p-1)(q-1)

If the result is 1, then you have found the correct key.

The solution is to use a strong passphrase for protecting your private keys.


no links.. management don't like that kind of discussion



ARR! Them pesky Navy! Get out of my sea!
irc://irc.villageirc.net/afterdawn http://www.pirateparty.org.uk/

This message has been edited since posting. Last time this message was edited on 20. November 2013 @ 22:03

ps355528
Senior Member
_
23. November 2013 @ 07:09 _ Link to this message    Send private message to this user   
Must say I'm surprised nobody has come along demanding I tell in detail how it's done.. oh well.. wonders never cease.. I know the clever people read my posts on these topics.. what do you do if the drive is already encrypted you ask? .. you know where the "install.log.txt" file lives in windoze?.. the first line is ALWAYS the same.. there's your clue.. along with the formula in previous reply..

ahhh codebreaking.. it's what these computer things we use today were invented to do.. they excel at it.. if it can be encrypted it can be decoded usng a computer.. and these guys aren't using a "one time pad"



ARR! Them pesky Navy! Get out of my sea!
irc://irc.villageirc.net/afterdawn http://www.pirateparty.org.uk/
Advertisement
_
__
 
_
Senior Member
_
23. November 2013 @ 17:51 _ Link to this message    Send private message to this user   
Originally posted by ps355528:
Must say I'm surprised nobody has come along demanding I tell in detail how it's done.. oh well.. wonders never cease.. I know the clever people read my posts on these topics.. what do you do if the drive is already encrypted you ask? .. you know where the "install.log.txt" file lives in windoze?.. the first line is ALWAYS the same.. there's your clue.. along with the formula in previous reply..

ahhh codebreaking.. it's what these computer things we use today were invented to do.. they excel at it.. if it can be encrypted it can be decoded usng a computer.. and these guys aren't using a "one time pad"
im not that kind of clever.LOL
afterdawn.com > forums > announcements > news comments > u.k. warns of computer ransom scam targeting millions
 

Digital video: AfterDawn.com | AfterDawn Forums
Music: MP3Lizard.com
Gaming: Blasteroids.com | Blasteroids Forums | Compare game prices
Software: Software downloads
Blogs: User profile pages
RSS feeds: AfterDawn.com News | Software updates | AfterDawn Forums
International: AfterDawn in Finnish | AfterDawn in Swedish | AfterDawn in Norwegian | download.fi
Navigate: Search | Site map
About us: About AfterDawn Ltd | Advertise on our sites | Rules, Restrictions, Legal disclaimer & Privacy policy
Contact us: Send feedback | Contact our media sales team
 
  © 1999-2026 by AfterDawn Ltd.

  IDG TechNetwork