- 406,887 CryptoWall infection attempts
- Total of 4,046 malware samples
- 839 command-and-control server URLs to send commands and receive data
- 5 second-tier IP addresses
- 49 different CryptoWall distribution campaigns
- Out of 49, a single campaign, dubbed as “crypt100“, infected as many as 15,000 computers worldwide
- cybercriminals behind the ransomware are likely to a singular group due to several similarities
- Same hacker group generated more than $18 Million in the past year alone from previous versions of CryptoWall.
According to the report, this single cybercriminal ring has generated as much as $325 million from the money paid by hundreds of thousands of CryptoWall 3.0 victims around the world to get their encrypted files unlocked.
Also Read: FBI Offers $3 Million Reward For Arrest Of Russian Hacker behind CryptoLocker Ransomware.
“When looking at the number of victims providing payment for the Cryptowall 3.0 ransomware, it becomes clear that this business model is extremely successful and continues to provide significant income for this group,” report said.
The Ransomware lands on PCs the same way other malware does.CryptoWall 3.0 is being primarily distributed through exploit kits and phishing emails, with infected attachments or that contain links to malicious websites.Also Read: Anyone can Now Create their Own Ransomware using This Hacking ToolKitCurrently, there is no option to crack or decrypt the files without the CryptoWall decryption key, so the only option is to accept the loss of files or pay the ransom money.The best defense is to ensure that files are regularly backed up in such a way that it can’t be reached by the attackers.A few more things you can do to prevent your Computer from getting infected with ransomware, such as:
- Use Antivirus software and Firewalls from reputable companies,
- Avoid Opening Emails and attachments from unknown sources,
- and always keep your operating system and software up-to-date.Also Read: Ransomware Attacks Threaten Wearable Devices and Internet of Things.