A new ransomware variant prevents infected computers from loading Windows by replacing their master boot record (MBR) and displays a message asking users for money, according to security researchers from Trend Micro.
“Based on our analysis, this malware copies the original MBR and overwrites it with its own malicious code,” said Cris Pantanilla, a threat response engineer at Trend Micro, in a blog post. “Right after performing this routine, it automatically restarts the system for the infection take effect.”
The MBR is a piece of code that resides in the first sectors of the hard drive and starts the boot loader. The boot loader then loads the OS.
Instead of starting the Windows boot loader, the rogue MBR installed by the new ransomware displays a message that asks users to deposit a sum of money into a particular account via an online payment service called QIWI, in order to receive an unlock code for their computers.
“This code will supposedly resume operating system to load and remove the infection,” Pantanilla said. “When the unlock code is used, the MBR routine is removed.”
As the name implies, ransomware applications hold something belonging to the victim in ransom until they pay a sum of money. This type of malware is considered the next step in the evolution of scareware, malicious programs that scare users into paying money.
The majority of ransomware applications disable important system functionality or encrypt documents and pictures, but this is the first ransomware program that Trend Micro researchers have seen replacing the MBR to prevent the system from starting.
This represents a serious escalation in ransomware techniques. While users can still run security tools to clean their systems of traditional ransomware applications and even recover some files, if Windows doesn’t start at all, like in this case, the remediation procedure becomes much more difficult.
Repairing the MBR is no trivial matter and usually requires booting from the Windows installation disk, getting into the recovery command console and typing special commands.
Ransomware infections are typically more common throughout Eastern Europe and South America, but this type of malware is slowly gaining traction in other regions of the world as well. Some variants that impersonate law enforcement agencies and ask victims to pay fictitious fines have recently been detected in Western Europe.
“Though overshadowed by other more newsworthy threats, ransomware attacks are definitely not out of picture. In fact, this threat appears to be flourishing, as evidenced by the growth of ransomware infections in other parts of Europe,” Pantanilla said.
Article source: http://rss.feedsportal.com/c/270/f/3551/s/1e596369/l/0Lnews0Btechworld0N0Csecurity0C3350A7970Cransomware0Eprevents0Ewindows0Efrom0Estarting0C0Dolo0Frss/story01.htm
View full post on National Cyber Security » Computer Hacking