ANNOUNCEMENT : ALL OF ROYAL MAIL'S EMPLOYMENT POLICIES (AGREEMENTS) AT A GLANCE (Updated 2021)... HERE

ANNOUNCEMENT : PLEASE BE AWARE WE ARE NOT ON FACEBOOK AT ALL!

TorrentLocker now targets UK with Royal Mail phishing

Latest Royal Mail and CWU news.This is an open forum.
TrueBlueTerrier
FORUM ADMINISTRATOR
Posts: 71985
Joined: 30 Dec 2006, 10:29
Gender: Male
Location: On my couch

TorrentLocker now targets UK with Royal Mail phishing

Post by TrueBlueTerrier »

http://www.welivesecurity.com/2014/09/0 ... -phishing/" onclick="window.open(this.href);return false;

Image

Three weeks ago, iSIGHT Partners discovered a new Ransomware encrypting victims’ documents. They dubbed this new threat TorrentLocker. TorrentLocker propagates via spam messages containing a link to a phishing page where the user is asked to download and execute “package tracking information”. In August, only Australians were targeted with fake Australian Post package-tracking page.

While tracking this new threat, ESET researchers found the malicious gang is targeting new victims. Internet users from the United Kingdom should be aware that fake Royal Mail package-tracking pages are online and distributing TorrentLocker.

Image

Royal Mail phishing page

The scheme is the same: you type a captcha then click to download a zip file containing the executable payload. It is interesting to note that the fake Royal Mail page will only show if the visitor is from the UK. Filtering seems to be based on the IP address of the request. If the request does not come from a UK IP address, the victim will be redirected to google.com. Three new domains are hosting the fake Royal Mail page:

royalmail-tracking.info
royalmail-tracking.biz
royalmail-tracking.org

Image
oyalmail-tracking.info registration information

As you can see, registration date for these domains is September 2nd so this campaign started very recently.

Image

ImageEncrypted files in users’ pictures

Image
Warning is shown upon execution of the malware

Once installed, victims’ documents are encrypted and they are being asked for a ransom of 350 £ if paid within 72 hours or 700 GPB otherwise. Payment is done via Bitcoin transaction (1.19 BTC or 2.38 BTC). To hide their infrastructure, the web server is hosted on a .onion host on the Tor network.

To make it is easy for victims to access the web page, TorrentLocker is giving links to Tor2Web nodes so they don’t have to install additional software to reach the .onion website. Interestingly, door2tor.org, the domain name of one of the suggested Tor2Web node, was registered only 2 weeks ago. Perhaps its purpose is only to allow TorrrentLocker’s victims to contact the server selling the decryption software.
Image
“Decryption software” sold on the Tor network

This threat caries the TorrentLocker name because it use the “Bit Torrent Application” Windows registry key to store its settings. It is unrelated to the BitTorrent protocol.
All post by me in Green are Admin Posts.May use chatgp to generate posts
Any post in any other colour is my own responsibility.
If you like a news story I posted please click the link to show support
Any news stories you can't post - PM me with a link
Retired