![]() ![]() Cryptolockerīoth malware families operate in a similar manner. In this blog post, we will provide a comparison between this “Cryptolocker 2.0” – detected by ESET products as MSIL/Filecoder.D and MSIL/Filecoder.E – and the “regular” Cryptolocker. Naturally, we wondered if this is a newer version of the widespread ransomware developed by the same gang. ![]() Last month we discovered another Filecoder family, which caught our attention because it called itself “Cryptolocker 2.0”. As shown by the ESET LiveGrid® detection statistics below, the country most affected by this family is the United States. ![]() While the majority of these ransomware families are most widespread in Russia, there are families that are targeting users (especially business users) globally.Ĭryptolocker, detected by ESET as Win32/Filecoder.BQ, is one of the most infamous examples and has received widespread public and media attention in the past two months. In our previous blog, Filecoder: Holding your data to ransom, we published information about the resurgence of file-encrypting ransomware since July 2013. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |