Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Criminals impersonate UK police to spread ransom Trojan

Demands payment for accessing extremist websites and porn

Article comments

The recent spate of ransom malware has taken a strange turn with the news that criminals are impersonating the UK’s Metropolitan Police Service in an attempt to persuade victims to pay a fine for being caught accessing extremist or porn websites.

After apparently being alerted by members of the public and an unamed security company, the Met’s Police Central eCrime Unit (PCeU) has put out a warning about the scam in which unnamed malware locks up infected PCs before demanding a “substantial fee” be sent to the police organisation.

“The message advises the user that they have been caught accessing extreme pornography or terrorism related websites,” said a note put out by the PCeU. “It states that to unlock their computers they are required to forward a substantial fee to the MPS, by way of an online payment service.”

The PCeU was not able to confirm which malware was involved nor to elaborate on the infection mechanism beyond stating that infection could happen after visiting “certain websites,”a vagueness that compromises the usefulness of the warning to some extent.

Given the adoption of the MPS as the method of threat, however, the attack will be aimed at UK users who have no connection to either porn or extremism.

The attack is similar to Ransom.an, a Trojan reported only days ago which demands in German language text that claims to be from Microsoft that victims pay $126 for a Windows license within 48 hours or be locked out of their PCs.

This type of ransom social engineering attack has flared up every now and again at relatively low levels ever since first being tried in 2006, with one of the most persistent culprits being Gpcode. Usually the locking mechanism is either non-existent or can be reversed easily by security researchers; occasionally the attack has used encryption but that approach has fallen out of favour because it adds complexity.

Ransom attacks are nowadays mostly extreme variations on fake antivirus scam theme, where attackers seek to gain payment for non-existent PC infections. It is probably the success of this type of attack as much as anything else that has kept ransom malware on the fringes.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *