{"id":28991,"date":"2015-02-05T05:40:58","date_gmt":"2015-02-05T10:40:58","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/holding-data-hostage-the-perfect-internet-crime.php"},"modified":"2015-02-05T05:40:58","modified_gmt":"2015-02-05T10:40:58","slug":"holding-data-hostage-the-perfect-internet-crime","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/holding-data-hostage-the-perfect-internet-crime.php","title":{"rendered":"Holding Data Hostage: The Perfect Internet Crime?"},"content":{"rendered":"<p><p>    Thousands of people will have their personal files held hostage    this year, by software that uses virtually unbreakable    encryption.  <\/p>\n<p>    Every so often someone invents a new way of making money on the    Internet that earns wild profits, attracts countless imitators,    and reshapes what it means to be online. Unfortunately, such a    shift took place last year in the world of online crime, with    the establishment of sophisticated malicious software known as    ransomware as a popular and reliable business model for    criminals.  <\/p>\n<p>    After infecting a computer, perhaps via an e-mail attachment or    a malicious website, ransomware automatically encrypts files,    which may include precious photos, videos, and business    documents, and issues an electronic ransom note. Getting those    files back means paying a fee to the criminals who control the    malwareand hoping they will keep their side of the bargain by    decrypting them.  <\/p>\n<p>    The money that can be made with ransomware has encouraged    technical innovations. The latest ransomware requests payment    via the hard-to-trace cryptocurrency Bitcoin and uses the    anonymizing Tor network. Millions of home and business    computers were infected by ransomware in 2014. Computer crime    experts say the problem will only get worse, and some believe    mobile devices will be the next target.  <\/p>\n<p>    Ransomware has been around for more than a decade. Older    examples tended to be ineffective or relatively easy to defeat.    But a new, more potent wave of ransomware emerged in late 2013    beginning with a version dubbed Cryptolocker. That malware    infected Windows computers and in about 30 minutes would    encrypt nearly all the data stored on them, as well as any    external or network drives, locking up photos, music, and    videos. Then it would display a message with a 72-hour    countdown timer telling the victim to pay a fee (usually around    $300) to retrieve the data. Step-by-step instructions explained    how to send the money by buying bitcoins or using a prepaid    debit card.  <\/p>\n<p>    Cryptolocker was professional in its design, and it used an    essentially unbreakable encryption system developed by Microsoft. At its peak, around    October 2013, Cryptolocker was infecting 150,000 computers a    month. And over the course of nine months, it is thought to    have generated about $3 million in ransom payments.  <\/p>\n<p>    The criminals behind Cryptolocker were taken down in June last year, after    collaboration among the FBI, U.K. and E.U. law enforcement    agencies, security companies, and academic researchers.    Investigators broke into the network used to control the    malware and uncovered a stash of encryption keys that were then    used to create a free service to rescue data belonging to    victims of the scam.  <\/p>\n<p>    Because of the breakout, if temporary, success of Cryptolocker,    the problem of ransomware seems sure to get bigger.  <\/p>\n<p>    Uttang Dawda, a malware researcher with security company    Fireeye,    who worked on the Cryptolocker rescue tool, says computer    criminals have identified ransomware as a valuable new business    model. If well designed, it provides easier profits than    stealing credit card details or banking information and then    selling that data on the black market. The crooks get    anonymity, faster profit, and dont have to spend time and    money finding middlemen, Dawda says.  <\/p>\n<p>    The most successful ransomware circulating today copies    Cryptolockers basic design but adds technical and    interface-design improvements.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/news\/534516\/holding-data-hostage-the-perfect-internet-crime\" title=\"Holding Data Hostage: The Perfect Internet Crime?\">Holding Data Hostage: The Perfect Internet Crime?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Thousands of people will have their personal files held hostage this year, by software that uses virtually unbreakable encryption. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-28991","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28991"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28991"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28991\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}