{"id":4520,"date":"2015-01-29T10:00:54","date_gmt":"2015-01-29T15:00:54","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4520"},"modified":"2020-02-26T18:59:34","modified_gmt":"2020-02-26T14:59:34","slug":"new-version-ctb-locker","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/new-version-ctb-locker\/4520\/","title":{"rendered":"Onion Ransomware News: Improved Version of CTB-Locker Emerges"},"content":{"rendered":"<p>A new variant of the Onion ransomware has emerged, though you might see it referred to as CTB-Locker or <a href=\"https:\/\/threatpost.com\/critroni-crypto-ransomware-seen-using-tor-for-command-and-control\/107306\" target=\"_blank\" rel=\"noopener nofollow\">Citroni<\/a>.<\/p>\n<p>Whatever you decide to call it, CTB-Locker is <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">a Cryptolocker-like piece of malware<\/a> that encrypts all the files on its host machines and demands a ransom payment in order to decrypt those files.<\/p>\n<p>CTB-Locker, or Curve Tor Bitcoin Locker, differs from other ransomware in that it uses The Tor Project\u2019s anonymity network in order to shield itself from takedown efforts that rely largely on static malware command and control servers. Its use of Tor also helps it evade detection and blocking. Another thing that protects CTB-Locker controllers is accepting only the decentralized and largely anonymous crypto-currency known as <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-all-this-business-about-bitcoin\/\" target=\"_blank\" rel=\"noopener nofollow\">Bitcoin<\/a>.<\/p>\n<div class=\"pullquote\">All this makes CTB-Locker a highly dangerous threat and one of the most technologically advanced encryptors out there.<\/div>\n<p>\u201cHiding the command and control servers in an anonymous Tor network complicates the search for the cybercriminals, and the use of an unorthodox cryptographic scheme makes file decryption impossible, even if traffic is intercepted between the Trojan and the server,\u201d <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-goes-to-toraims-to-eclipse-infamous-cryptolocker\/\" target=\"_blank\" rel=\"noopener nofollow\">Fedor Sinitsyn, a senior malware analyst at Kaspersky Lab told the Daily last year<\/a>. \u201cAll this makes it a highly dangerous threat and one of the most technologically advanced encryptors out there.\u201d<\/p>\n<p>The new version of CTB-Locker \u2014 known to Kaspersky Lab products as Trojan-Ransom.Win32.Onion \u2014 contains some interesting upgrades, according to Sinitsyn. As is increasingly the case<a href=\"https:\/\/threatpost.com\/coinvault-ransomwares-free-file-decrypt-a-show-of-good-faith\/109371\" target=\"_blank\" rel=\"noopener nofollow\">, it offers its victims a sort of \u2018trial demo\u2019 whereby the infected can choose five files to decrypt without paying the ransom<\/a>. It\u2019s also available in three new languages: German, Dutch, and Italian. CTB also evades research efforts by detecting virtual machines that researchers use to safely analyze malware and not executing in those environments. Instead of connecting directly to Tor, CTB proxies itself through six additional anonymization services in order to further complicate tracking and takedown efforts.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How to explain <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> to a 5 year old <a href=\"http:\/\/t.co\/hSnc2fzQgW\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/hSnc2fzQgW<\/a> <a href=\"http:\/\/t.co\/Ge2kjGQBlh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Ge2kjGQBlh<\/a> <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@kaspersky<\/a> <a href=\"https:\/\/twitter.com\/SophosLabs?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@SophosLabs<\/a> <a href=\"https:\/\/twitter.com\/AppRiver?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@AppRiver<\/a> <a href=\"https:\/\/twitter.com\/CheckPointSW?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@checkpointsw<\/a><\/p>\n<p>\u2014 Silicon UK (@SiliconGB) <a href=\"https:\/\/twitter.com\/SiliconGB\/status\/557524183983591424?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 20, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The best line of defense against this and other threats is to have backed up your machine yesterday (and to back it up again next week). You also need <a href=\"https:\/\/www.kaspersky.com\/free-trials\/multi-device-security?redef=1&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">to run a strong antivirus product<\/a> and make sure all of your software, operating systems, and applications are <a href=\"https:\/\/www.kaspersky.com\/blog\/security-is-20\/\" target=\"_blank\" rel=\"noopener nofollow\">up to date with the latest patch installations<\/a>. Once you become infected, there is no way to recover the files encrypted by CTB-locker. You could pay the ransom, but despite the fact that cybercrime is an increasingly professional and customer service oriented business, there is no guarantee that you will ever receive the key to decrypt your files.<\/p>\n<p>Like it or not, <a href=\"https:\/\/threatpost.com\/ransomware-is-the-future-of-consumer-cybercrime\/109724\" target=\"_blank\" rel=\"noopener nofollow\">ransomware is big business<\/a> and its only likely to become a bigger problem moving forward as more of our daily lives and belongings are incorporated into the so-called \u201cInternet of Things.\u201d\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>The best line of #defense against any #ransomware is to have backed up your machines yesterday.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F9ssL&amp;text=The+best+line+of+%23defense+against+any+%23ransomware+is+to+have+backed+up+your+machines+yesterday.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Thus far, the Kaspersky Security Network has seen some 361 attempts at infection, mostly in Russia and Ukraine. Users of Kaspersky Lab products are specifically protected from this and other encryption malware, unless they have the \u201cSystem Watcher\u201d feature disabled. System Watcher works by immediately making locally protected backup copies of user files when suspicious programs access them. Please make sure you have this module running.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Tip of the week: How to protect yourself from <a href=\"https:\/\/twitter.com\/hashtag\/cryptoware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cryptoware<\/a> <a href=\"http:\/\/t.co\/ZaxUdhnTp1\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/ZaxUdhnTp1<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"http:\/\/t.co\/3UsHF1bi38\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/3UsHF1bi38<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/518044170947407872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 3, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>TL; DR:<\/strong>\u00a0Kaspersky users are protected while they keep System Watcher on. If you are already infected, the only way to get your files back is to pay the ransom, though there\u2019s no guarantee you will receive them even if you pay. World\u2019s tough.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.<\/p>\n","protected":false},"author":42,"featured_media":4522,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[557,374,561,261,36,433,531],"class_list":{"0":"post-4520","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-backup","10":"tag-bitcoin","11":"tag-crypto","12":"tag-encryption","13":"tag-malware-2","14":"tag-ransomware","15":"tag-tor"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/new-version-ctb-locker\/4520\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/new-version-ctb-locker\/4575\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/new-version-ctb-locker\/5076\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/new-version-ctb-locker\/6792\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/new-version-ctb-locker\/7310\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/new-version-ctb-locker\/6729\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/new-version-ctb-locker\/6792\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/new-version-ctb-locker\/7310\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/new-version-ctb-locker\/7310\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/backup\/","name":"backup"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4520"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4520\/revisions"}],"predecessor-version":[{"id":15977,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4520\/revisions\/15977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4522"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}