Kidnappers used to make ransom notes with letters cut out of magazines. Now, notes simply pop up on your computer screen, except the hostage is your PC.
In the past year, hundreds of thousands of people across the world have switched on their computers to find distressing messages alerting them that they no longer have access to their PCs or any of the files on them.
The messages claim to be from the FBI, 20 other law enforcement agencies across the globe or, most recently, Anonymous, a shadowy group of hackers. The computer users are told that the only way to get their machines back is to pay a steep fine.
And, curiously, it is working. The scheme is making more than US$5 million a year, according to computer security experts who are tracking them.
The scourge dates to 2009 in Eastern Europe. Three years later, with business booming, the perpetrators have moved west. Security experts say that there are now more than 16 gangs of sophisticated criminals extorting millions from victims across Europe.
The threat, known as “ransomware,” recently hit the US. Some gangs have abandoned previously lucrative schemes, like fake anti-virus scams and banking trojans, to focus on ransomware full time.
Essentially online extortion, ransomware involves infecting a user’s computer with a virus that locks it. The attackers demand money before the computer will be unlocked, once the money is paid, they rarely unlock it.
In the vast majority of cases, victims do not regain access to their computer unless they hire a computer technician to remove the virus manually. Even then, they risk losing all files and data because the best way to remove the virus is to wipe the computer clean.
It might be hard to fathom why anyone would agree to give hundreds of dollars to a demanding stranger, but security researchers estimate that 2.9 percent of compromised computer owners take the bait and pay. In some countries, the payout rate has been as high as 20 percent.
That people do fall for it is a testament to criminals’ increasingly targeted and inventive methods. Early variations of ransomware locked computers, displayed images of pornography and, in Russian, demanded a fee — often more than US$400 — to have it removed. Current variants are more targeted and toy with victims’ consciences.
Researchers say criminals now use victims’ Internet addresses to customize ransom notes in their native tongue. Instead of pornographic images, criminals flash messages from local law enforcement agencies accusing them of visiting illegal pornography, gambling or piracy sites and demand they pay a fine to unlock their computer.
Victims in the US see messages in English purporting to be from the FBI or the US Department of Justice. In the Netherlands, people get a similar message, in Dutch, from the local police, while Irish variations even demand money in Gaelic.
The latest variants speak to victims through recorded audio messages that tell users that if they do not pay within 48 hours, they will face criminal charges. Footage from a computer’s Webcam has also been used to give the illusion that law enforcement is watching.
The messages often demand that victims buy a preloaded debit card that can be purchased at a local drugstore — and enter the PIN. That way it is impossible for victims to cancel the transaction once it becomes clear that criminals have no intention of unlocking their PC.
The hunt is on to find these gangs. Researchers at Symantec said they had identified 16 ransomware gangs. They tracked one gang that tried to infect more than 500,000 PCs during an 18-day period.
Even if researchers can track their Internet addresses, catching and convicting those responsible can be difficult. It requires cooperation among global law enforcement, and such criminals are skilled at destroying evidence.
Charlie Hurel, an independent security researcher based in France, was able to hack into one group’s computers to discover just how gullible their victims could be. On one day last month, the criminals’ accounting showed that they were able to infect 18,941 computers, 93 percent of all attempts.
Of those who received a ransom message that day, 15 percent paid. In most cases, Hurel said, hackers demanded 100 euros (US$129), making their haul for one day’s work more than US$400,000.
That is significantly more than hackers were making from fake anti-virus schemes a few years ago, when so-called “scareware” was at its peak and criminals could make as much as US$158,000 in one week.
Scareware dropped significantly last year after a global clampdown by law enforcement and private security researchers. Internecine war between scareware gangs caused its final demise. As Russian criminal networks started fighting for a smaller share of profits, they tried to take each other out with denial of service attacks.
Now, security researchers are finding that some of the same criminals who closed down scareware operations as recently as a year ago are back deploying ransomware.
“Things went quiet,” Eric Chien, a researcher at Symantec who has been tracking ransomware scams, said. “Now we are seeing a sudden build-up of ransomware using similar methods.”
Victims become infected in many ways. In most cases, people visit compromised Web sites that download the program to their machines without so much as a click.
Criminals have a penchant for infecting pornography sites because it makes their law enforcement threats more credible; embarrassing people who look at pornography makes them more likely to pay. Symantec’s researchers say there is also evidence that they are paying advertisers on sex-based sites to feature malicious links that download ransomware onto victims’ machines.
“As opposed to fooling you, criminals are now bullying users into paying them by pretending the cops are banging down their doors,” said Kevin Haley, Symantec’s director of security response.
More recently, researchers at Sophos, a British computer security company, found that thousands of people were getting ransomware through sites hosted by GoDaddy, the popular Web services company that manages 50 million domain names and hosts about 5 million Web sites on its servers.
Sophos said hackers were breaking into GoDaddy users’ accounts with stolen passwords and setting up what is known as a subdomain. For example, instead of www.nameofsite.com, hackers would set up the Web address nameofsite.blog.com, then send e-mails to customers with the link to the subdomain which — because it appeared to come from a trusted source— was more likely to lure clicks.
Scott Gerlach, GoDaddy’s director of information security operations, said it appeared the accounts had been compromised because account owners independently clicked on a malicious link or were compromised by a computer virus that stole password credentials. He advised users to enable GoDaddy’s two-step authentication option, which sends a second password to users’ smartphones every time they try to log in, preventing criminals from accessing their account with one stolen password and alerting users when they try.
One of the scarier things about ransomware is that criminals can use victims’ machines however they like. While the computer is locked, the criminals can steal passwords and even get into the victims’ online bank accounts.
Security experts warn to never pay the ransom. A number of vendors offer solutions for unlocking machines without paying the ransom, including Symantec, Sophos and F-Secure. The best solution is to visit a local repair shop to wipe the machine clean and reinstall backup files and software.
“This is the new Nigerian e-mail scam,” Haley said. “We’ll be talking about this for the next two years.”
Recently, China launched another diplomatic offensive against Taiwan, improperly linking its “one China principle” with UN General Assembly Resolution 2758 to constrain Taiwan’s diplomatic space. After Taiwan’s presidential election on Jan. 13, China persuaded Nauru to sever diplomatic ties with Taiwan. Nauru cited Resolution 2758 in its declaration of the diplomatic break. Subsequently, during the WHO Executive Board meeting that month, Beijing rallied countries including Venezuela, Zimbabwe, Belarus, Egypt, Nicaragua, Sri Lanka, Laos, Russia, Syria and Pakistan to reiterate the “one China principle” in their statements, and assert that “Resolution 2758 has settled the status of Taiwan” to hinder Taiwan’s
Singaporean Prime Minister Lee Hsien Loong’s (李顯龍) decision to step down after 19 years and hand power to his deputy, Lawrence Wong (黃循財), on May 15 was expected — though, perhaps, not so soon. Most political analysts had been eyeing an end-of-year handover, to ensure more time for Wong to study and shadow the role, ahead of general elections that must be called by November next year. Wong — who is currently both deputy prime minister and minister of finance — would need a combination of fresh ideas, wisdom and experience as he writes the nation’s next chapter. The world that
Can US dialogue and cooperation with the communist dictatorship in Beijing help avert a Taiwan Strait crisis? Or is US President Joe Biden playing into Chinese President Xi Jinping’s (習近平) hands? With America preoccupied with the wars in Europe and the Middle East, Biden is seeking better relations with Xi’s regime. The goal is to responsibly manage US-China competition and prevent unintended conflict, thereby hoping to create greater space for the two countries to work together in areas where their interests align. The existing wars have already stretched US military resources thin, and the last thing Biden wants is yet another war.
Since the Russian invasion of Ukraine in February 2022, people have been asking if Taiwan is the next Ukraine. At a G7 meeting of national leaders in January, Japanese Prime Minister Fumio Kishida warned that Taiwan “could be the next Ukraine” if Chinese aggression is not checked. NATO Secretary-General Jens Stoltenberg has said that if Russia is not defeated, then “today, it’s Ukraine, tomorrow it can be Taiwan.” China does not like this rhetoric. Its diplomats ask people to stop saying “Ukraine today, Taiwan tomorrow.” However, the rhetoric and stated ambition of Chinese President Xi Jinping (習近平) on Taiwan shows strong parallels with