翻訳と辞書
Words near each other
・ Cryptolepine
・ Cryptolepis
・ Cryptolepis (fish)
・ Cryptolepis (plant)
・ Cryptolepis cryptolepioides
・ Cryptolepis dubia
・ Cryptolepis oblongifolia
・ Cryptolepis sanguinolenta
・ Cryptolepis sinensis
・ Cryptoleptosphaeria
・ Cryptolestes
・ Cryptolithodes
・ Cryptolithodes sitchensis
・ Cryptoloba
・ Cryptolobatidae
CryptoLocker
・ Cryptologa
・ Cryptologa nystalea
・ Cryptologia
・ CryptoLogic
・ Cryptologic
・ Cryptologic technician
・ Cryptology (album)
・ Cryptology ePrint Archive
・ Cryptology Research Society of India
・ Cryptoloop
・ Cryptomarasmius
・ Cryptomartus hindi
・ Cryptomastix
・ Cryptomastix devia


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

CryptoLocker : ウィキペディア英語版
CryptoLocker

CryptoLocker is a ransomware trojan which targeted computers running Microsoft Windows,〔 believed to have first been posted to the Internet on 5 September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin.
Although CryptoLocker itself is readily removed, files remained encrypted in a way which researchers considered infeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.
CryptoLocker was isolated in late-May 2014 via Operation Tovar—which took down the Gameover ZeuS botnet that had been used to distribute the malware. During the operation, a security firm involved in the process obtained the database of private keys used by CryptoLocker, which was in turn used to build an online tool for recovering the keys and files without paying the ransom. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. Other instances of encryption-based ransomware that have followed have used the "CryptoLocker" name (or variations), but are otherwise unrelated.
== Operation ==
CryptoLocker typically propagated as an attachment to a seemingly innocuous e-mail message, which appears to have been sent by a legitimate company. A ZIP file attached to an email message contains an executable file with the filename and the icon disguised as a PDF file, taking advantage of Windows' default behaviour of hiding the extension from file names to disguise the real .EXE extension. CryptoLocker was also propagated using the Gameover ZeuS trojan and botnet.〔〔〔(【引用サイトリンク】url=http://www.computerworld.com/s/article/9243537/Cryptolocker_How_to_avoid_getting_infected_and_what_to_do_if_you_are_ )
When first run, the payload installs itself in the user profile folder, and adds a key to the registry that causes it to run on startup. It then attempts to contact one of several designated command and control servers; once connected, the server generates a 2048-bit RSA key pair, and sends the public key back to the infected computer.〔 The server may be a local proxy and go through others, frequently relocated in different countries to make tracing them more difficult.〔
The payload then encrypts files across local hard drives and mapped network drives with the public key, and logs each file encrypted to a registry key. The process only encrypts data files with certain extensions, including Microsoft Office, OpenDocument, and other documents, pictures, and AutoCAD files.〔 The payload displays a message informing the user that files have been encrypted, and demands a payment of 400 USD or Euro through an anonymous pre-paid cash voucher (i.e. MoneyPak or Ukash), or an equivalent amount in bitcoin (BTC) within 72 or 100 hours (while starting at 2 BTC, the ransom price has been adjusted down to 0.3 BTC by the operators to reflect the fluctuating value of bitcoin),〔 or else the private key on the server would be destroyed, and "nobody and never will be able to restore files."〔〔 Payment of the ransom allows the user to download the decryption program, which is pre-loaded with the user's private key.〔 Some infected victims claim that they paid the attackers but their files were not decrypted.〔
In November 2013, the operators of CryptoLocker launched an online service that claimed to allow users to decrypt their files without the CryptoLocker program, and to purchase the decryption key after the deadline had expired; the process involved uploading an encrypted file to the site as a sample and waiting for the service to find a match; the site claimed that a match would be found within 24 hours. Once found, the user could pay for the key online; if the 72-hour deadline passed, the cost increased to 10 bitcoin.〔(【引用サイトリンク】url=http://www.networkworld.com/community/node/84174 )〕〔(【引用サイトリンク】url=http://www.pcworld.com/article/2060640/cryptolocker-creators-try-to-extort-even-more-money-from-victims-with-new-service.html )

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「CryptoLocker」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.