The first thing Mark Wilson noticed was a drag on the computer system that he and five others used at his company. "Everything was just crawling," said Wilson, president and co-owner of Apex Cary Insurance in Apex, N.C.
Wilson called Raleigh, N.C.-based Petronella Technology Group, which asked if he noticed anything like a ransom note.
Sure enough, Wilson found a pop-up on one of the monitors asking for $300 in exchange for a key that would unscramble all of the business's files that it had encrypted.
Wilson's company had been hit by ransomware, which is a form of malware -- or malicious software -- that infects a computer and its connected systems, and then demands a payment. The attackers are likely criminal organizations based in Russia and Eastern Europe.
The company's digital files had been scrambled by CryptoLocker, a version of ransomware that first appeared in September. It has since infected about 25 million systems across the globe, about 70 percent of which are in the U.S., according to Keith Jarvis, senior security researcher with the Dell SecureWorks Counter Threat Unit.
CryptoLocker appears to be spreading through emails that lure victims into opening them, according to a November alert issues by the U.S. Department of Homeland Security's Computer Emergency Readiness Team.
The CryptoLocker infections offer a glimpse into criminal organizations that work together, using the Internet to gain personal information in order to sell it or use it to steal from bank accounts.
Ransomware has been around for years, but untraceable and unregulated virtual currencies have fueled increasing attacks, according to a McAfee Labs report on 2014 threat predictions.
Defense options, the report and experts said, include not opening suspicious emails and keeping anti-virus software and patches current. An effective computer file backup structure will also minimize risk.
Dell researchers, Jarvis said, have observed the CryptoLocker being distributed through cyber criminals working together to mine personal data using different malware, such as botnets -- a network of infected machines that communicate with controlling cyber criminals.
Gameover Zeus, one of the most notorious and sophisticated botnets involved in online banking fraud, is distributed by the Cutwail spam botnet, which used email attachments to lure users. After an attachment has been opened, Upatre malware downloads and then executes Gameover Zeus, which brings in other malware families, including CryptoLocker.
Dell SecureWorks has seen variants of Zeus go after small and medium businesses because they are usually less secure, said Elizabeth Clarke, a spokesperson for Dell SecureWorks. (continued...)
© 2014 News & Observer (Raleigh, NC) under contract with MarketWatch. All rights reserved.