Categories: News

Bitcoin Ransomware CryptoLocker Targets Video Gamers

Earlier this week, reported on how the Bitcoin ransomware CryptoLocker infected over 200 computers at the Free University of Amsterdam. By the look of things, the CryptoLocker ransomware is targeting a different audience this time around, by directly going after video gamers and reviewers. No one is safe from CryptoLocker these days it seems.

Mainstream Games Affected

Original reports state that over 20 [popular] video games can be affected by the Cryptolocker ransomware, but truth be told, the list is far longer than that. Seeing as how most video games use the same type of data file extensions, more and more well-known titles are being affected by this new version of the CryptoLocker ransomware.

Popular games include but are not limited to: Minecraft, Half-Life 2, The Elder Scrolls V: Skyrim, Assassin’s Creed, and Metro 2033. However, multiplayer games such as World of Warcraft, Day Z, League of Legends and World of Tanks are also targeted by the ransomware. More importantly, Steam – one of the world’s most popular gaming library platforms – has been reported to suffer from these attacks as well.

And the bad news doesn’t stop there unfortunately. Video game developers will also feel the wrath of this new CryptoLocker ransomware version, as game development software is vulnerable as well. RPG Maker, Unity 3D and Unreal Engine are some of the examples which have been verified to be subject to infection by CryptoLocker.

Related Post

Same Modus Operandi As Before

Even though this is a new version of CryptoLocker [or so it appears to be anyway] the modus operandi of this ransomware remains the same. Important files are encrypted, the user gets a warning about being infected with CryptoLocker and the fact they have to pay up in order to have their files decrypted again. Payment can be done with Bitcoin and credit card, and the payment procedure itself is operating through a website located in the TOR domain.

According to a report by Bromium Labs, every instance of the CryptoLocker ransomware generates its very own Bitcoin wallet address. Besides encrypting and decrypting files on a host’s computer, the CryptoLocker ransomware also generates its own Bitcoin address once a computer has been infected.

With 185 file extensions proven to be vulnerable to the new CryptoLocker ransomware, it is expected that many individuals and companies will be affected down the line. Needless to say, the fact that Bitcoin is somehow tied to restoring your files will not instill any confidence in the disruptive digital currency.

Source :

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Published by
JP Buntinx

Recent Posts

Elrond Price Up 19% After Maiar DEX Launch

Elornd price is up over 19% today, setting it as the biggest gainer on…

7 hours ago

Top 3 Most Anticipated Metaverse Coins on the Market

Metaverse is the name of the game when it comes to high ROI cryptocurrency projects.…

9 hours ago

SafeMoon Price Shows Strong Support at the $0.000003 Level

SafeMoon price shows strong support at the $0.0000031 level as cryptocurrency markets continue to struggle…

10 hours ago

3 Insanely Undervalued Shiba Inu Themed Meme Coins

If you missed the Shiba Inu hype, the good news is it's never too late.…

11 hours ago

Celer Network Price Up 19%, Is This the Next Loopring?

Celer Network price is up 19% today, making it the biggest gainer on Currently…

14 hours ago

Is Metahero the Golden Ticket for Metaverse 3.0?

Metaverse coins are all the hype right now, and recently we've been asked on twitter…

15 hours ago

This website uses cookies.