{"id":52844,"date":"2015-01-15T07:47:14","date_gmt":"2015-01-15T12:47:14","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptowall-ransomware-is-back-with-new-version-after-two-months-of-silence\/"},"modified":"2015-01-15T07:47:14","modified_gmt":"2015-01-15T12:47:14","slug":"cryptowall-ransomware-is-back-with-new-version-after-two-months-of-silence","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/cryptowall-ransomware-is-back-with-new-version-after-two-months-of-silence\/","title":{"rendered":"CryptoWall ransomware is back with new version after two months of silence"},"content":{"rendered":"<p><p>    Attackers have started    distributing a new and improved version of the CryptoWall    file-encrypting ransomware program over the past few days,    security researchers warn.  <\/p>\n<p>    The new version, dubbed    CryptoWall 3.0, uses localization and passes traffic to a site    where users can pay for their decryption keys through two    anonymity networksTor and I2P (the Invisible Internet    Project).  <\/p>\n<p>    CryptoWall is a sophisticated    ransomware program that encrypts the victims files with a    strong cryptographic algorithm. Users are asked to pay the    equivalent of $500 in bitcoin virtual currency in order to    receive the decryption key that allows them to recover their    files.  <\/p>\n<p>    The ransomware program    provides users with links to several sites that act as Tor    gateways. These proxy servers are supposed to automatically    connect the users browser to the CryptoWall decryptor service    hosted on the Tor network. However, it seems that with    CryptoWall 3.0, the users traffic is also passed through    another anonymity network called I2P.  <\/p>\n<p>    A malware researcher who uses    the online alias Kafeine     discovered this change after infecting his test system with    a CryptoWall 3.0 sample. When he tried to visit one of the Tor    gateway links as instructed by the malware he received an error    in Russian that roughly translates to: I2P website is    unavailable. Perhaps it is disabled, the network is congested    or your router is not well integrated with other nodes. You can    repeat the operation.  <\/p>\n<p>    This suggests that the site    where users can pay the ransom and get their decryption keys    from is no longer hosted on Tor, but on I2P. The Tor gateway    likely passes the users traffic to a Tor hidden service first,    which then connects to the I2P network to retrieve the real    website. The ransom note also instructs users to download the    Tor browser and access a Tor hidden service directly if the Tor    gateway URLs no longer work.  <\/p>\n<p>    CryptoWall is not the first    malware program to use I2P. In November 2013, security    researchers reported that an online banking Trojan called    i2Ninja     was being advertised on cybercriminal forums. The program    communicated with a command-and-control server hosted on the    I2P network, instead of Tor.  <\/p>\n<p>    Like Tor, the I2P network    allows users to run hidden services such as websites that are    only accessible from within the network itself. With Tor such    websites use the .onion pseudo-top-level domain, while with I2P    they use .i2p.  <\/p>\n<p>    A new version of Silk Road,    an online marketplace for illegal goods and services, was    recently launched on I2P. The site was previously hosted on Tor    and     was shut down two times by the FBI.  <\/p>\n<p>    Cybercriminals started    distributing CryptoWall 3.0 Monday, after around two months of    inactivity that made researchers wonder whether the threat was    gone.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2868972\/cryptowall-ransomware-is-back-with-new-version-after-two-months-of-silence.html\/RK=0\/RS=FGHQbKN_9ui3wVs3JN36yZiTId4-\" title=\"CryptoWall ransomware is back with new version after two months of silence\">CryptoWall ransomware is back with new version after two months of silence<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Attackers have started distributing a new and improved version of the CryptoWall file-encrypting ransomware program over the past few days, security researchers warn.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/cryptowall-ransomware-is-back-with-new-version-after-two-months-of-silence\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-52844","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/52844"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=52844"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/52844\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=52844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=52844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=52844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}