Reveton Trojan now encrypts images, documents and executables to thwart victims from removing the malware A new version of the well-known police ransomware takes the unusual step of encrypting files on the infected PC, so the malware cannot be easily removed.The ransomware warns victims that they have committed a crime, such as downloading pirated software, and their computers will remain locked until a fine is paid. The warning is dressed up to look like it’s from the FBI or other law enforcement agency.Typically, ransomware can be found and removed without paying the fraudsters. However, the latest version of the police ransomware Trojan encrypts images, documents and executables to stifle attempts to remove the malware, says a report in the AVG News and Threats blog. “While not completely original, it is certainly unusual,” Adam Wosotowsky, a security researcher for McAfee Labs, said of the anti-removal tactic. “Personally, I’ve cleaned some ransomware off a few machines and haven’t heard of lost files due to encryption. To avoid file loss, we recommend copying personal files off the box ASAP and then re-installing Windows.” The malware does not encrypt Windows system files, so the infected PC will still work. However, the app’s shenanigans do lead to a loss of some data and prevents many third-party programs from working.[See also: Threat report fingers Android again, this time for ransomware] Known as Reveton, the ransomware was initially found spreading in various European countries in early 2012. In May, Trend Micro found templates that indicated the authors were planning to target people in the U.S. and Canada.In August, the FBI issued a warning saying the ransomware was spreading quickly. “We’re getting inundated with complaints,” Donna Gregory of the Internet Crime Complaint Center said at the time. Symantec estimates that nearly 3% of victims end up paying ransoms, which translates into more than $5 million a year paid to cybercriminals. The malware is typically installed when victims click a link on a compromised website. Once infected, a PC immediately locks and the warning demanding payment appears. Malicious scripts and iFrames, Web technologies used to infect PCs on compromised sites, had an 83% success rate last year, according to Cisco’s 2013 Security Report, released Wednesday. “These types of attacks often represent malicious code on ‘trusted’ Web pages that users may visit every day– meaning an attack is able to compromise users without even raising their suspicion,” the report says. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe