Categories: News

Bitcoin Ransomware CryptoLocker Targets Video Gamers

Earlier this week, reported on how the Bitcoin ransomware CryptoLocker infected over 200 computers at the Free University of Amsterdam. By the look of things, the CryptoLocker ransomware is targeting a different audience this time around, by directly going after video gamers and reviewers. No one is safe from CryptoLocker these days it seems.

Mainstream Games Affected

Original reports state that over 20 [popular] video games can be affected by the Cryptolocker ransomware, but truth be told, the list is far longer than that. Seeing as how most video games use the same type of data file extensions, more and more well-known titles are being affected by this new version of the CryptoLocker ransomware.

Popular games include but are not limited to: Minecraft, Half-Life 2, The Elder Scrolls V: Skyrim, Assassin’s Creed, and Metro 2033. However, multiplayer games such as World of Warcraft, Day Z, League of Legends and World of Tanks are also targeted by the ransomware. More importantly, Steam – one of the world’s most popular gaming library platforms – has been reported to suffer from these attacks as well.

And the bad news doesn’t stop there unfortunately. Video game developers will also feel the wrath of this new CryptoLocker ransomware version, as game development software is vulnerable as well. RPG Maker, Unity 3D and Unreal Engine are some of the examples which have been verified to be subject to infection by CryptoLocker.

Related Post

Same Modus Operandi As Before

Even though this is a new version of CryptoLocker [or so it appears to be anyway] the modus operandi of this ransomware remains the same. Important files are encrypted, the user gets a warning about being infected with CryptoLocker and the fact they have to pay up in order to have their files decrypted again. Payment can be done with Bitcoin and credit card, and the payment procedure itself is operating through a website located in the TOR domain.

According to a report by Bromium Labs, every instance of the CryptoLocker ransomware generates its very own Bitcoin wallet address. Besides encrypting and decrypting files on a host’s computer, the CryptoLocker ransomware also generates its own Bitcoin address once a computer has been infected.

With 185 file extensions proven to be vulnerable to the new CryptoLocker ransomware, it is expected that many individuals and companies will be affected down the line. Needless to say, the fact that Bitcoin is somehow tied to restoring your files will not instill any confidence in the disruptive digital currency.

Source : http://labs.bromium.com/2015/03/12/achievement-locked-new-crypto-ransomware-pwns-video-gamers/

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

BEFE Coin: The MEME Coin Revolutionizing Wealth Creation

Do you know about BEFE? This relatively nascent coin is now the talk of the…

5 hours ago

Bitgert Coin: The Crypto Revolutionizing the Market

Indeed, the list of altcoins continues to grow in the crypto world and that’s why…

5 hours ago

Arweave ($AR) Leads Daily Gainers With 17% Surge On Coinmarketcap

Today, the decentralized storage network Arweave ($AR) has captured the spotlight as the top daily…

15 hours ago

Arbitrum Recovers To $1 Amidst Development Activity Surge

Today marked a slight resurgence for Arbitrum as it reclaimed its $1 trading price, following…

15 hours ago

BlockDAG Eclipse Top Crypto Coins Amid Shiba Inu Dips & Avalanche Staking.

Best Crypto to Buy: BlockDAG’s Moonshot Keynote Sparks $22.2M Presale, Eclipsing Shiba Inu And Avalanche…

23 hours ago

Solana Meme Coins Bonk (BONK) And (MEW) Fail To Make New ATH, ETFSwap (ETFS) Presale Explodes

The once-booming trend of Solana meme coins appears to be reaching its twilight. Backed by…

1 day ago