New LoroBot ransomware encrypts files, demands $100 for decryption
According to the message which replaces the desktop's background upon execution, the files are encrypted with 256-bit AES encryption, and that "there's a 0% chance that you will be able to manually decrypt the files without the encryption key". However, this particular cybercriminal appears to be bluffing since the ransomware encrypts the data using the XOR cipher.
Naturally, by doing so he allowed CA's researchers to release a free decryptor for Win32/Gpcode.J. Despite that compared to previous campaigns, this one looks rather primitive, ransomware is clearly a trend, one that has already started converging with popular delivery channels such as scareware, and utilizing efficient payment processes such as the ubiquitous SMS micro-payment.
- Go through related posts: New ransomware locks PCs, demands premium SMS for removal; Scareware meets ransomware: "Buy our fake product and we'll decrypt the files"; Who's behind the GPcode ransomware?; How to recover GPcode encrypted files?
With the ever-decreasing price for do-it-yourself SMS ransomware building tools within the underground marketplace (average price is between $15 and $30), new market entrants will inevitably prompt the vendors of these releases to "innovate" and introduce new features in an attempt to compete with one another.
Interestingly, despite GPCode's and LoroBot's practice of encrypting popular file extensions, the majority of SMS-based ransomware releases currently offered for sale, emphasize on the practice of locking down an infected party's computer using "Unlicensed copy of Windows" themes, instead of encrypting files.