in

Cryptolocker ransomware variant spreads through USB drives

A new version of the Cryptolocker ransom Trojan has been discovered that is able to spread through USB drives. The malware is targeted at peer-to-peer file-sharers. This may seem and odd targeting choice as it limits the list of potential victims, but it also increases the likelihood of the malware being downloaded and is also targeting a demographic that is more likely to use USB drives. 

Security researchers have discovered what looks like a copycat version of the Cryptolocker ransom Trojan that drops some of the malware’s sophistication in favor of the single innovation of being able to spread via USB drives. According to security firms Trend Micro and ESET, the recently discovered worm-like Crilock.A variant (which calls itself “Cryptolocker 2.0”) poses as an updater for Adobe Photoshop and Microsoft Office on sites frequented by peer-to-peer file-sharers.

What do you think?

Avatar of Sal McCloskey

Written by Sal McCloskey

Sal McCloskey is a tech blogger in Los Angeles who (sadly) falls into the stereotype associated with nerds. Yes, he's a Star Trek fan and writes about it on Uberly. His glasses are thick and his allergies are thicker. Despite all that, he's (somehow) married to a beautiful woman and has 4 kids. Find him on Twitter or Facebook,

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Corning develops new 3D-forming method for Gorilla Glass

How will digital publishing evolve in this year and the years to come?