Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Critroni crypto ransomware seen using TOR for command and control

Critroni crypto ransomware seen using TOR for command and control

2014/07/18

Threatpost - (International) Security researchers found that a new piece of ransomware known as Critroni has been spotted in use by various attackers using the Angler exploit kit to infect users with it and other malware. The ransomware encrypts victims' files and demands a ransom, and uses the TOR network to contact its command and control servers.

Source: http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:01