Technology content trusted in North America and globally since 1999
7,601 Reviews & Articles | 56,164 News Posts

CryptoWall 2.0 uses TOR network to victimize business users

The new CryptoWall variant has moved to the TOR network, making it even more difficult to clamp down on
By: Michael Hatamoto | Hacking & Security News | Posted: Oct 16, 2014 10:30 am

The CryptoWall ransomware has migrated to the TOR network, encrypting critical files that are necessary to conduct day-to-day operations for business users. Ideally for the cybercriminals, users won't be able to rely on a backup and the company will instead choose to pay the ransom for access to their own PCs and servers. Using TOR makes CryptoWall 2.0 more difficult to track down and remove, giving cybercriminals a potential goldmine as they victimize businesses.

 

cryptowall_2_0_uses_tor_network_to_victimize_business_users_01

 

KnowBe4 was contacted by a company that was hit by the new variant of CryptoWall, with the IT admin's computer infected - which spread to seven servers in just one hour, shutting down the entire server farm. Despite having recent backups that could be used, there would be too much downtime to recover data and have the servers operational in a timely manner.

 

"The cyber criminals hit pay dirt with this one and the admin ended up paying the ransom, 1.3 bitcoin, rather than face the serious costs caused by days of downtime," said Stu Sjouwerman, KnowBe4 CEO, in a press statement. "This is the next generation of ransomware and you can expect this new version to spread like wildfire."

NEWS SOURCES:Prweb.com, Knowbe4.com, Improveyourit.com

Related Tags

Got an opinion on this news? Post a comment below!
loading