Just two weeks after its release, Windows 10 has already been installed for free on more than 70 million PCs. Microsoft is pulling all the stops to make the OS as appealing as possible. It even released a Windows 10 media creation tool to make upgrading to the new OS easier. Unfortunately, all the hype has also reached the attention of cybercriminals.
The new scam campaign was first reported by Cisco just two days after Windows 10 was released. The scam revolves around a spam campaign in which an email containing the CTB-Locker ransomware is circulated.
The legitimate looking email will instruct you to download and install an attached executable file that will allegedly allow you to upgrade your OS to Windows 10 for free.
There are several characteristics that make the scam email quite convincing.
The attachment “Win10Installer.zip” contains a ransomware variant called “CTB-Locker,” which is loaded instead of the Windows 10 installer, and which – after the user downloads and extracts the installer files – overtakes all accessible files in a matter of seconds and renders them inaccessible. And, to be sure you are sufficiently alarmed in the process, the CTB-Locker clears the desktop background, seats its own you’ve-been-duped message, and similarly flashes the encryption notice which looks like the below.
The way the CTB-Locker works is by running through your directories immediately and converts the file name extensions of your files into random ones using an elliptical curve cryptography. This provides the maddening result of you being able to recognize the core file name of your precious files and folders but being completely unable to access them. You instead will be notified that the file you are attempting to access or open is corrupted, damaged, or an unrecognized file type with which you currently have no programs or applications that can open it.
And to ensure anxiety is particularly piqued, CTB-Locker will show you a notice that claims your files will be permanently deleted if payment is not made within 96 hours. An unwelcome timer displays the ticking-down seconds until an impending removal of the secret key to unlock and decrypt the files. In essence, the door on your files will be locked and CTB-Locker will throw away the key. Of course, the notice also provides you with instructions on how to make the payment to make it all go-away. And if negotiating with criminals is against your moral code, plan to say bye- bye to your files, because currently there is no way to retrieve the private key or decrypt your files once CTB-Locker is rooted without paying the ransom.
Given the growing popularity of Windows 10, expect more phishing scams offering free and quick upgrades to follow, especially since Microsoft awards the free upgrade in batches. The best way to avoid falling prey to such schemes is to exercise vigilance and reasonable precaution against all email offers.
Be sure to keep complete and updated backups of all critical data so that if you do fall victim to a virus, you will have a reliable restore point. Image-level backups removes the downside of having to reorganize files after restoring them. And of course be skeptical of what you see on the internet — particularly of offers that seem too good (or too convenient) to be true!
If this has you thinking about backups, security and making sure you are adequately protected against threats like this one, we’re here to help. Use the “Comments & Contact” button below to submit any questions you have about ransomware variants, network security, or to get more information on Dynamic Quest’s services and products.
More than 33 billion records will be stolen by cybercriminals by 2023, an increase of 175% from 2018.
It takes an average of 287 days for security teams to identify and contain a data breach, according to the “Cost of a Data Breach 2021” report released by IBM and Ponemon Institute.
The internal team was energized. With the Level 1 work off its plate, the team turned its attention to the work that fueled company growth and gave them job satisfaction.
40% of businesses will incorporate the anywhere operations model to accommodate the physical and digital experiences of both customers and employees (Techvera).
The cost of cybercrime is predicted to hit $10.5 trillion by 2025, according to the latest version of the Cisco/Cybersecurity Ventures “2022 Cybersecurity Almanac.”.
Forty-three percent of attacks are aimed at SMBs, but only 14% are prepared to defend themselves (Accenture).
The three sectors with the biggest spending on cybersecurity are banking, manufacturing, and the central/federal government, accounting for 30% of overall spending (IDC).
The average cost of a data breach in the United States is $8.64 million, which is the highest in the world, while the most expensive sector for data breach costs is the healthcare industry, with an average of $7.13 million (IBM).
We did a proof of concept that met every requirement that our customer might have. In fact, we saw a substantial improvement.
We did everything that we needed to do, financially speaking. We got our invoices out to customers, we deposited checks, all the things we needed to do to keep our business running, and our customers had no idea about the tragedy. It didn’t impact them at all.
“We believe our success is due to the strength of our team, the breadth of our services, our flexibility in responding to clients, and our focus on strategic support.”