Bitcoin Ransomware Education – CryptoFortress

A few less common types of Bitcoin ransomware are still in circulation right now, although most people will have never heard of these variants. Every type of malware has its own quirks, and CryptoFortress is no different in that regard. On top of encrypting files and asking for payment, CryptoFortress turned out to be a vastly different creature.

Also read: Yobit Exchange Plagued By Withdrawal And Coin Listing Delays

CryptoFortress Is TorrentLocker With A Twist

The TorrentLocker strain of Bitcoin ransomware has created many types of offspring, yet CryptoFortress is one of the most unique offerings in the malware world to date. While this ransomware represents a payment page and ransom message nearly identical to TorrentLocker, infection poses an additional threat to the end user.

In fact, CryptoFortress was not created by the same group responsible for TorrentLocker, as a new collective appears to have stolen that malware’s HTML template and CSS files. Originality is not that difficult in the ransomware world, yet some people prefer to put in even less effort to earn some money, even if it is in illegitimate ways.

Under the hood, things are vastly different between TorrentLocker and CryptoFortress though. For starters, both types of malware are spread through different means, as TorrentLocker relies on spam emails, whereas CryptoFortress uses an exploit kit to infect computers all over the world.

Related Post

Additionally, CryptoFortress has the ransomware included in the malware executable itself, as there is no control server such as presented by TorrentLocker. Both solutions use different types of cryptographic libraries (Microsoft CryptoAPI versus LibTomCrypt), and the CryptoFortress ransom amount is fixed at one Bitcoin.

Similar to the TorrentLocker ransomware, CryptoFortress also deleted any shadow volumes users might have stored on their devices. This prevents accessing files by loading a backup of the system onto the computer. Not a very pleasant situation, especially when considering how this malware would also encrypt files on network shares.

The end of 2014 was a trying time for computer users all over the world, as both CryptoFortress and TorrentLocker were running in parallel. A combination of spam emails and an exploit kit put a lot of consumers at risk, although the number of infections remained relatively low, all things considered.

Source: We Live Security

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Essential Guide to Crypto Presales in 2024: BDAG, SLOTH, SPONGEV2, SMOG, BTCMTX

2024's Premier Crypto Presale: BlockDAG’s 30,000x ROI Takes the Lead Over SLOTH, SPONGEV2, SMOG, and…

29 mins ago

Rising to New Heights: BEFE Coin’s $0.01 Potential

The BEFE coin is now living the dream that any creator in the cryptocurrency space…

2 hours ago

Why Analysts Believe Bitgert Coin Price Could Surge +2000% in the Near Future

Bitgert coin has endured a superb position of growth owing to the increase in demand…

2 hours ago

Framework Ventures Boosts Stake In Synthetic Protocol Amid Price Decline

The Synthetic protocol, represented by its native token $SNX, has experienced a notable decline of…

11 hours ago

Early Investor Moves 2.5 Million ONDO Tokens Amid Price Decline

The cryptocurrency $ONDO has experienced a 2.5% decline in its price today, adding to a…

11 hours ago

BlockDAG’s Momentum Surpasses Cardano Price Predictions & Toncoin’s Outlook

BlockDAG Leads with Moon Keynote Strategy as Presale Hits $20.6 Million Amid Cardano Downturn &…

18 hours ago