Malware

Highly targeted ransomware campaign hit Swedish Telia customers

According to a new analysis published by experts at Heimdal Security a new Ransomware campaign targeted millions by spoofing Telco giant Telia.

Ransomware continues to represent one of the most insidious and aggressive cyber threats, a new campaign launched by threat actors in the wild is impersonating the telecom giant Telia.

According to the experts at the Heimdal Security firm, millions of Telia’s customers are exposed to the risk of infection. Hackers have launched a sophisticated and surgical campaign that leverages on a mix of attack vectors.

Most of the victims are located in Sweden, in a first stage of the attack the threat actors send victims message including a link to an invoice which appears to come from Telia.

When the victims open the malicious message and click the link, they are redirected to a web page that displays them a Captcha code.

Only when the victims provide the code, a TorrentLocker payload is served to the victim’s machine. The malware is downloaded only if the victims’IP addresses are from Sweden, users from other countries are redirected to the Google page.

“The Torrentlocker family is well known for its highly targeted spam email campaigns,” said Heimdal Security researcher Andra Zaharia, in an analysis. “Attackers carefully localize the emails, ransom notes and other elements tied to the campaign. The more targeted the attack, the higher the chances for it to be effective.” explained Andra Zaharia, Heimdal Security researcher, in a detailed analysis of the Telia campaign.

The TorrentLocker encrypts all the data files available on the local drive and on connected network drives, then displays a ransom note to instruct victims on the payment procedure.

When the ransomware infects the machines they connect to the C&C server in order to send back data including digital certificates from the infected device.

“It will then register the infected computer and the data harvested from it, which includes certificates from the infected device. A new thing about this attack is that the ransomware will inject itself into the memory of the “explorer.exe” process (child process). It will then drop the main component with an arbitrary filename. Available contact details on the device will also be collected and sent to the aforementioned C&C server, certainly to be used in future spam campaigns.” reads the analysis published by Heimdal Security.

The crooks request the payment of 1.15 Bitcoins (roughly 4099 SEK (441 EUR)), if the victims don’t pay within a deadline, the ransom value will double.

At the time I was writing the campaign is detection only by 19 of 57 antivirus solutions according to VirusTotal.

As usual, let me suggest to keep your software up to date and maintain a fresh backup of your data.

If you appreciate my effort in spreading cyber security awareness, please vote for Security Affairs as best European Security Blog. Vote SecurityAffairs in every section it is reported. I’m one of the finalists and I want to demonstrate that the Security Affairs community a great reality.

https://www.surveymonkey.com/r/secbloggerwards2016

Thank you

Pierluigi

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Telia ransomware campaign, malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

2 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

4 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

15 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

20 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

1 day ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

1 day ago

This website uses cookies.