Bitcoin Ransomware Education – Cryptorbit

There are a fair few types of Bitcoin ransomwares which have gone by almost entirely unnoticed, yet that doesn’t mean they are less of a threat. Cryptorbit has never been the center of much media attention, even though this piece of malware was known under the alias of HowDecrypt as well. 

Also read: What Is a Bitcoin Block?

Cryptorbit Does Not Discriminate Based On File Type

TheMerkle_Cryptorbit Ransomware Bitcoin

Similar to just about any kind of Bitcoin ransomware to ever exist, Cryptorbit has one simple goal: infect as many computers around the world as possible and to encrypt any and all files on the host. Whereas most types of Bitcoin ransomware would target specific file extensions, this malware does not differentiate between files and just encrypted everything.

No version of Microsoft Windows was safe during it’s infection period, as Cryptorbit was targeting any operating system from Windows XP to Windows 8. Once a computer has been infected, the user is left with a text file containing instructions on how to proceed and get rid of the infection.

However, there is a twist to how Cryptorbit goes about encrypting the files on a computer. Instead of completely encrypting the file, the malware only replaces the first 512 bytes of the file and appending them to the end of the infected file. As a result, the files would become corrupted, making it all but impossible to recover files by recovering them with a backup.

However, this method of infection was not the best choice, as it is rather easy to find a tool which will restore file headers to their original status. But that is not all, as the Bitcoin ransomware is also capable of creating dummy files on the device, and install a piece of Bitcoin mining software.

Installing this software would not only encrypt the files on a computer, but it would use up a lot of resources attempting to mine Bitcoin at the same time. Even though only the computer’s CPU cores would be taxed during this process, it can slow down the infected machine by quite a margin despite not generating much revenue at all.

As part of the repair process, users were redirected to a website using the Tor protocol where they would see further instructions on how to make the Bitcoin payment. In most cases, the ransom value was set at US$500, Unlike other types of Bitcoin ransomware, Cryporbit didn’t seem to increase the ransom value after a certain amount of time has elapsed.

Source: Bleeping Computer

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

No Responses

  1. Pingback: ผลบอล March 17, 2024
  2. Pingback: blote borsten May 14, 2024
  3. Pingback: รับแฮกเฟส June 20, 2024
  4. Pingback: คลินิกปลูกผม July 16, 2024
  5. Pingback: หาเพื่อนเที่ยว September 14, 2024
  6. Pingback: ซื้อทราย หาดใหญ่ September 24, 2024