iTnews

Windows 10 upgraders targeted in ransomware scam

By Allie Coyne on Aug 4, 2015 10:03AM
Windows 10 upgraders targeted in ransomware scam

Users warned not to click on attachments in phishing emails.

Opportunistic attackers are taking advantage of impatient Windows users by sending out phishing emails designed as a Windows 10 upgrade alert from Microsoft, but which instead delivers ransomware.

Unsuspecting PC owners have begun receiving emails - which appear legitimate - containing a .zip compressed email attachment purporting to be a Windows 10 installer, according to Cisco's security team.

Windows 10 became available in Australia and 189 other countries last Thursday. It is offered as a free download for activated copies of Windows 7 and 8, but the volume of traffic generated by millions of users wanting to upgrade their operating systems is causing delays.

"The fact that users have to virtually wait in line to receive this update makes them even more likely to fall victim to this campaign," Cisco infosec researcher Nick Biasini wrote in a blog post.

He said scammers are spoofing the sender's email address to make it appear as though the email is from Microsoft. The message actually originated from an IP address allocated to a network in Thailand, he said.

Similarly, the attackers have mimicked the blue and white colour scheme used by Microsoft in its Windows 10 branding in the dodgy emails, making them appear more legitimate than run-of-the-mill phishing emails.

Windows 10 scam email. Source: Cisco

Once a user downloads the attached .zip file, rather than receiving a Windows 10 installer, a piece of ransomware dubbed CTB-Locker launches and encrypts the user's files.

The malware requests payment within 96 hours to decrypt the documents. If users fail to pay within that period of time or attempt to remove the ransomware, the blackmailers threaten to destroy the decryption key and leave files permanently scrambled.

Biasini said the ransomware was being delivered to users at a high rate.

The attackers' use of bitcoin for payment and a command server over the Tor anonymity network for communication made tracing those behind the ransomware emails difficult.

Biasini said CTB-Locker contained several features that differed from large-scale ransomware: CTB-Locker uses elliptical curve encryption rather than RSA asymmetric encryption, and only offered a 96 hour window to pay for file decryption - shorter than standard.

The ransomware is also using hard-coded IP addresses on non-standard ports to communicate, rather than compromised Wordpress sites as other recent versions do.

Additionally, CTB-Locker is exchanging a significant amount of data between systems - around 100 network streams to various IP addresses - which Biasini said was largely uncharacteristic for ransomware.

Cisco advised users to keep an external backup of their files, and pointed out Microsoft was not distributing Windows 10 through emails or attachments. The company has opted to automatically download the OS onto systems of users who previously opted to upgrade.

Windows 10 has been installed on more than 14 million devices since it launched.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
ciscomicrosoftransomwaresecuritysoftwareupgradewindows 10

Partner Content

Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Don't miss Australia’s premiere IoT Conference on 9th June
Promoted Content Don't miss Australia’s premiere IoT Conference on 9th June
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • 11th Annual Fraud Prevention Summit 2022
  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Allie Coyne
Aug 4 2015
10:03AM
0 Comments

Related Articles

  • Edtech vendors invaded student privacy: Human Rights Watch
  • Heroku hackers got account passwords via OAuth token theft
  • Patch now against Linux 'Nimbuspwn' root priv-esc bugs
  • Videoconferencing apps can access muted mics
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

What to expect from the incoming Labor government

What to expect from the incoming Labor government

Digital Nation

COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.