


The current versons of CryptoLocker dynamically generate new bitcoin payment addresses for each infection instance. To date, no one has successfully recovered files after CryptoLocker infection - unless they paid the ransom.ĬryptoLocker's ransom amount has varied since its debut in September, but currently sits at $300 (USD) and 300 Euro - the ransom price is typically listed in cash currency, and Bitcoin.īitcoin instability over the past few months has prompted CryptoLocker's masterminds to reduce the ransom to 1 BTC, 0.5 BTC, and then to where it is currently: 0.3 BTC.Īt first, CryptoLocker included static bitcoin addresses for everyone who was infected. If you didn't pay, you gave up your files - and any new ones you made on your system after infection. According to reports from victims, payments may be accepted within minutes or may take several weeks to process." In Dell's words, "During this payment validation phase, the malware connects to the C2 server every fifteen minutes to determine if the payment has been accepted. Upon submitting payment, victims' computers no longer show the threatening countdown screen and instead see a new payment activation window. When all files have been encrypted, each victim is then presented with an ugly splash screen with an ominous countdown timer, demanding payment. (.) Instead of using a custom cryptographic implementation like many other malware families, CryptoLocker uses strong third-party certified cryptography offered by Microsoft's CryptoAPI.īy using a sound implementation and following best practices, the malware authors have created a robust program that is difficult to circumvent.ĭell's paper suggests CryptoLocker's puppetmasters are in Russia and Eastern Europe, with primary targets in the United States, as well as other English-speaking countries. This communication provides the malware with the threat actors' RSA public key, which is used throughout the encryption process. The encryption process begins after CryptoLocker has established its presence on the system and successfully located, connected to, and communicated with an attacker-controlled C2 server. Then, your files are swiftly and silently owned. CryptoLocker then deletes the original executable file. When first executed, the malware creates a copy of itself in either %AppData% or %LocalAppData%. Prior to these actions, the malware ensures that it remains running on infected systems and that it persists across reboots. The malware doesn't appear to the victim until all files are successfully encrypted (and in case you thought it was safe to proceed, you're not: CryptoLocker periodically scans for new files).ĬryptoLocker hides its presence from victims until it has successfully contacted a command and control (C2) server and encrypted the files located on connected drives. Many victims believe that CryptoLocker briefly moved its ransom sums through Bitcoin addresses to launder the bounty was repeatedly cited as a digital "mixer" point.
