January 28, 2015 By Shane Schick 2 min read

The FBI is setting the record straight on ransomware, warning users they shouldn’t believe sudden pop-ups on their screen that demand a fine be paid for breaking the law, even if it allegedly comes from the FBI.

In an article on its blog, the FBI said ransomware is increasing even as cybercriminals change tactics. Traditionally, malware distributed via spam email was an easy way for attackers to take over a computer system in return for payment. However, a more popular “drive-by” approach that embeds malicious code into a website or pop-up window is now being used. The intended victims are also expanding beyond consumers to businesses and from desktops to mobile phones, the FBI added.

The FBI isn’t the only group noting a rise in ransomware. Security firm Lookout’s recently released Mobile Threat Report shows distinct trends in not only the types of malware typically aimed at smartphones — such as ScarePakage and ScareMeNot — but the countries targeted, which include the United Kingdom, Germany and the United States. Those forced to pay were typically meeting demands of between $300 and $500, the report added.

A story on Dark Reading suggested ransomware on mobile devices may be a sign that those creating it are becoming more sophisticated and mature in their methods, in much the same way computer viruses shifted from desktops to other form factors. What is consistent with nearly all forms of hacking attempts is the social engineering aspect, where those doing the blackmailing pretend to be the FBI or other law enforcement officials.

What may make matters worse, at least for some consumers, is that paying cybercriminals may also require them to become more familiar with the latest in cryptocurrencies. The FBI report said bitcoin is becoming a popular way to collect money from victims. This was backed up by recent reports in SC Magazine of a new variant on Curve-Tor-Bitcoin Locker, which is being used by cybercriminals to charge computer users the equivalent of nearly $1,800 to set their device free.

As a piece in The Economist explained, bitcoin is a natural fit for cybercriminals because it is far more anonymous than demanding payments through debit systems or bank accounts, which can be more easily tracked. Meanwhile, the code involved seems to undergo a nearly constant metamorphosis, requiring even experienced security researchers to work overtime to keep up.

Hopefully, consumers will pay attention to the FBI’s warning and corporations will spread the news to their employees. Education on this topic cannot happen fast enough. At the very least, it needs to spread more quickly than most types of ransomware.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today