CryptoLocker: An Innovative & Creative Hack
In recent months, one of the most innovative and creative hacks in recent years has been wreaking havoc around the world. This hack has come to be known as CryptoLocker. I think it is an example of creative thinking while using some tried and true hacking and security techniques.
In this hack, the victim's precious and valuable files are encrypted and locked from their own access. These can include .doc, .pdf, .jpg, .xls, etc.
For the home user, these can include family pictures, tax returns, and other important files. In a business environment, it can include almost anything necessary to keep a business running, such as financial statements, taxes, and human resource records.
After the attacker encrypts these files, they then ask for a "fee" for access to the files, and in many cases, are getting that fee.
Having first appeared in September 2013, it targets just Windows computers. It usually makes its way to the victim via an email attachment. When the user clicks on the attachment, it uses RSA 2048 bit public key cryptography to encrypt all the target files while the attacker holds the private key.
RSA encryption uses two keys that are different, one public and one private that uses very large prime number factorization.
As this image above depicts above, the attacker gives the victim 72 hours to pay the ransom in the amount of $300 or 300 EUR for the private key and access to their files.
When you first become infected by the CryptoLocker payload, it saves itself as a random named file to the root of "%AppData%". It will then create one of the following autostart entries in your registry.
- KEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "CryptoLocker"
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "CryptoLocker"
- KEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "CryptoLocker<version_number>"
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "CryptoLocker<version_number"
Obviously, CrytoLocker is a social engineering hack. It requires that people click on a link to then infect their computer with the CryptoLocker payload. The creators of CryptoLocker were creative in getting people to believe that the email contained something of value or interest.
Here is a partial list of some of the subjects that creators used to get people to click on their attachment. Note that many of them have a business context.
- USPS - Your package is available for pickup (Parcel 173145820507)
- USPS - Missed package delivery ("USPS Express Services" <firstname.lastname@example.org>)
- USPS - Missed package delivery
- FW: Invoice <random number>
- ADP payroll: Account Charge Alert ACH Notification ("ADP Payroll" <@adp.com>)
- ADP Reference #09903824430
- Payroll Received by Intuit
- Important - attached form
- FW: Last Month Remit
- McAfee Always On Protection Reactivation
- Scanned Image from a Xerox WorkCentre
- Scan from a Xerox WorkCentre scanned from Xerox
- Annual Form - Authorization to Use Privately Owned Vehicle on State Business
- Fwd: IMG01041_6706015_m.zip
- My resume
- New Voicemail Message
- Voice Message from Unknown (675-685-3476)
- Voice Message from Unknown Caller (344-846-4458)
- Important - New Outlook Settings Scan Data
- FW: Payment Advice - Advice Ref:GB293037313703 / ACH credits / Customer Ref:pay run 14/11/13
- Payment Advice - Advice Ref:GB2198767
- New contract agreement. Important Notice - Incoming Money Transfer
- Notice of under-reported income
- Notice of unreported income
- Last months reports
- Payment Overdue - Please respond
- FW: Check copy
- Payroll Invoice
- Corporate eFax message from "random phone #" - 8 pages (random phone # & number of pages)
- Past due invoices
- FW: Case FH74D23GST58NQS Symantec Endpoint Protection: Important System Update - requires immediate action
This hack has been successful across the globe, including many small businesses, city and state governments, and even a few police departments in the U.S.
Although security experts advise against paying the ransom for your files, the price is low enough that many businesses and families are willing to pay to get access once again to their precious files. What other option do they have?
I think one of the important aspects of this hack is that the ransom is reasonable low and most families and businesses can afford to pay it. As successful hack doesn't need to go after the one big prize to be successful (see Salami Slicing). In addition, the hackers have appeared to honor their word and unlock the victim's files when they pay.
A survey by researchers at the University of Kent found that 41% of UK respondents who were CryptoLocker victims, claimed to have agreed to pay the ransom. This conflicts with the 3% that Symantec estimated and the 0.4% estimated by Dell SecureWorks.
As of December 2013, the attackers Bitcoin account had a balance of $27,000,00!
The key takeaway here is that these hackers really didn't invent anything new, they simply used some tried and true social engineering techniques coupled with some knowledge of public key cryptography to garner millions of dollars!