Welcome to 2015 with new type deadly of virus: Ransomware

avi

Juggernaut
CryptoWall 2.0 is the latest immunoresistant strain of a larger body of viruses known as ransomware. The virus is thought to infiltrate your computer when you click on a legitimate-looking attachment or through existing malware lurking on your hard drive, and once unleashed it instantly encrypts all your files, barring access to a single photo or tax receipt.

Everyone has the same questions when they first hear about CryptoWall:

Is there any other way to get rid of it besides paying the ransom? No — it appears to be technologically impossible for anyone to decrypt your files once CryptoWall 2.0 has locked them. (My mother had several I.T. professionals try.)

Please read the full article - http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html?_r=0
 
poor windows users!

Any operating system with a large enough market share to warrant attention from malware programmers will be target of such malware. Since Windows and Android currently fit the bill, they have been prime targets so far. When any of the other OS gets a sizable enough market share to catch the eye of hackers and malware writers, they too will become targets. In essence, its not that the other OS are secure, its just that they enjoy "Security by virtue of obscurity".

Looking at the number of security issues that get raised for all kinds of software (including the OS), its blatantly stupid to assume that any of the OS or other software is really secure.[DOUBLEPOST=1420402391][/DOUBLEPOST]And yeah, just want to add that Ransomware is nothing new, they have been around for a long time now. The concept was popular and much discussed about a decade ago.
 
Last edited:
it appears to be technologically impossible for anyone to decrypt your files once CryptoWall 2.0 has locked them.
it is true for any virus once the virus has its payload executed. the payload in this case is to encrypt all the files. in earlier days, the pay load used to be some thing like wiping all the data or simply formatting the data. if a the payload is something simple like dumping garbage on the entire volume no one can ever recover the files. I don't see anything new apart from a simple virus here. except that bit-coin is enabling anonymous money exchange.
 
Any operating system with a large enough market share to warrant attention from malware programmers will be target of such malware. Since Windows and Android currently fit the bill, they have been prime targets so far. When any of the other OS gets a sizable enough market share to catch the eye of hackers and malware writers, they too will become targets. In essence, its not that the other OS are secure, its just that they enjoy "Security by virtue of obscurity".
Looking at the number of security issues that get raised for all kinds of software (including the OS), its blatantly stupid to assume that any of the OS or other software is really secure.

Sure, I too believe that no particular OS is completely secure.
But windows is designed to be insecure and a big commercial ecosystem runs with this design.
To start with, I give a question to think about:

"What special codes do so-called 'anti-virus' makers write that microsoft can't write?"

And microsoft is under obligation to provide a secure OS to its 'consumers'.

In fact, microsoft is well known for releasesing security-patches with delays or sometimes long delays.
In contrast, I had once seen security patch released within 24 hours of reporting vulnerability for some obscure OS.
Microsoft will never never act so swiftly.


Just to have an idea of what it means to be concerned for security, read this paragraph about FreeBSD.
 
^ have such a hatred towards windows that you are biased in your opinion. Linux is wulnerable too if you are running it as root or any other user with privileges.
for example, iOS is based on linux kernel. darwin os I think. now do you think iOS is safer than windows?
 
I don't see anything new apart from a simple virus here. except that bit-coin is enabling anonymous money exchange.
Only if it was just another virus... this has been around for quite few months and has actually affected many corporate machines. People had to pay ransom to get their data recovered. Since its encryption there is not much that other data recovery or anti virus s/w could do. Infact many corporates have sent advisories to their employees for not clicking any such links or paying money.
I have read that even shutting down the PC (by long pressing the power button or disconnecting from mains) has made the disk unreadable since the encryption process was interrupted...
 
Sure, I too believe that no particular OS is completely secure.
But windows is designed to be insecure and a big commercial ecosystem runs with this design.

^^ No, windows is not designed to be insecure. Its just that because of its market share there are thousands of hackers and malware writers trying to find new attack vectors and writing malware to utilize them.

To start with, I give a question to think about:

"What special codes do so-called 'anti-virus' makers write that microsoft can't write?"

There are several types of malware. Viruses are one of them. There are several types of viruses as well. Anti Virus scanners usually rely on virus signatures which are recognizable patterns found in virus code to identify them. They also rely on other techniques like Heuristics to identify many potentially harmful software. Newer versions of windows already has some of the features of a standard antivirus integrated into the OS. Its the signature and other similar techniques that require data collection and large scale analysis that we rely on separate anti virus for.

Make no mistake, when you have as many writers of malware for other OS, it would be same situation for them as well.

And microsoft is under obligation to provide a secure OS to its 'consumers'.

In fact, microsoft is well known for releasesing security-patches with delays or sometimes long delays.
In contrast, I had once seen security patch released within 24 hours of reporting vulnerability for some obscure OS.
Microsoft will never never act so swiftly.

Misconception for the most part. Microsoft is fairly responsive about critical issues, however due to the popularity of the OS, they have far more attackers and issues to deal with and they still do a fair job. Apple for instance which in next in line for desktop market is far unresponsive with both security as well as normal bug issues. They are so lazy that they don't release patches even when its just a matter of integrating a fix that Google has done.

FYI, the first Ransomware to use Public key cryptography was developed for and demonstrated on a Mac back in the 90's.

During the course of my work experience, I have reported bugs to both Microsoft and Apple and have experienced their attitude and response times first hand and let me tell you that Apple is quite lacking. They actually seem to think that they can afford issues to stagnate because not many are out there trying to exploit them and that actually makes sense.

Linux does not have much desktop market share. But Android is for all purposes a flavor of Linux with Linux kernel and because of its widespread use on mobile and desktop, it has just as many attackers as Windows on desktop and has proven to be just as vulnerable.

In our production systems, we have a mix of Linux, Solaris and Windows based servers (mainly because of acquisitions and merges of multiple companies) and the most successfully attacked parts of our sub systems are the Linux servers. Not once have I seen our Windows based servers being attacked and broken into? Why do do you think that is? No, its not because Windows servers are more secure than the Linux ones, its because the hackers are more interested in the Linux sub systems. Its the same story for malware. When Malware writers become really interested in Mac OS or Linux, there will be no stopping them. Every day new attack vectors would be found and quickly exploited.
 
^ have such a hatred towards windows that you are biased in your opinion. Linux is wulnerable too if you are running it as root or any other user with privileges.
for example, iOS is based on linux kernel. darwin os I think. now do you think iOS is safer than windows?

You choose a wrong example to frame your question.
Certainly, it lost its credibility as a secure OS long back.
Still, iOS is less vulnerable than windows.

Its true, I hate windows. And this hatered is not without reasons.
I am not against using/buying an OS like windows.
What I don't want is (or hate is) the bundled fear of viruses/malwares which forces a user to purchase an anti-virus.
Then, annual renewals of anti-virus.

unless microsoft builds a singular secure OS and provide security updates as quickly as Linux developers do, it will keep loosing users and respect.
 
Only if it was just another virus... this has been around for quite few months and has actually affected many corporate machines. People had to pay ransom to get their data recovered. Since its encryption there is not much that other data recovery or anti virus s/w could do. Infact many corporates have sent advisories to their employees for not clicking any such links or paying money.
I have read that even shutting down the PC (by long pressing the power button or disconnecting from mains) has made the disk unreadable since the encryption process was interrupted...
Isnt it simple to understand that encryption is not supposed to be recovered without having the proper decryption key? The virus is simply encrypting the data using some encryption mechanism. if you interrupt in the middle, you will have half cypher and half data. which is basically unrecoverable even if you pay the ransom.
Still, iOS is less vulnerable than windows.
in which world? ;)

do you know the shellshock vulnerability in bash?
did you know the ssl key issue in debian that lived for 2 years?
In order to keep a warning from being issued by the Valgrind analysis tool, a maintainer of the Debian distribution applied a patch to the Debian implementation of the OpenSSL suite, which inadvertently broke its random number generator in the process. The broken version was included in the Debian release of September 17, 2006 (version 0.9.8c-1). Any key generated with the broken random number generator, as well as data encrypted with such a key, was compromised.[citation needed] The error was reported by Debian on May 13, 2008.[20]

On the Debian 4.0 distribution (etch), these problems were fixed in version 0.9.8c-4etch3 and for the Debian 5.0 distribution (lenny), these problems were fixed in version 0.9.8g-9.[20]
 
Isnt it simple to understand that encryption is not supposed to be recovered without having the proper decryption key? The virus is simply encrypting the data using some encryption mechanism. if you interrupt in the middle, you will have half cypher and half data. which is basically unrecoverable even if you pay the ransom.
Simple to understand for you and me as we are computing guys... Try explaining that to a random PC user in an enterprise whose only job is to prepare invoices for clients or make reports that too in excel sheet....
Infact honestly ask many programmers and they are not too aware of how exactly 'encryption' works.
Even then its (the ransome virus) effect is negligible in India since we dont use computers to that extent yet.
Think of it in US or western countries... They use PC for everything. So the effect of the virus is more in those countries.
 
"a maintainer of the Debian distribution applied a patch to the Debian implementation of the OpenSSL suite, which inadvertently broke its random number generator in the process."

You are telling me that RNG (Random Number Generator) of openSSL became predictable, due to a wrong patch by the maintainer of a particular distribution (Debian).
This doesn't mean that OpenSSL RNG was predictable in all linux distributions. Nor does it mean that openSSL is insecure in the context you have cited it. Though loopholes have been discovered and patched on openSSL many times.

And again I will assert my point, that in linux world, discovered vulnerabilities are patched without unnecessary delays, that makes linux a trusted OS.
 
^ I cited the example because it became a big fiasco during that time. you can read more about the whole thing here and here. And I dont agree with you when you say "vulnerabilities are patched with un necessary delays". I know how difficult it is to get support in the open source community. I work day in and out in that field.
 
Back
Top