Revoyem Ransomware Proliferating Globally, Displays Appalling Distribution
According to a report by Kafeine, Security Researcher who writes on a personal website named 'Malware Don't Need Coffee,' the widely known ransom malware Revoyem, its other name DirtyDecrypt, can be seen robustly proliferating from Great Britain and Germany where it was first detected during March 2013. Presently, Revoyem's purveyors are distributing their ware forcefully all over the world, published threatpost.com dated September 16, 2013.
Users becoming contaminated with the ransomware are generally visitors of porn sites, adds Kafeine. From there, they face an even worse situation. They get diverted through one TrafficHolder malicious advertisement onto a web-page containing sexually-abused child content that loads the Styx attack toolkit onto their PCs. Simultaneously, ransomware Revoyem blocks those victims' access to their systems, while informs them that they have illegal material on their computers.
Kafeine explains the accusation is true for, the user has just watched those unlawful materials despite him getting diverted there against his wish.
According to the researcher, DirtyDecrypt was identified within fifteen countries, including France, Spain, the Netherlands, Italy and U.S.
Infected users are as well shown laws they've supposedly violated, presented with the penalties, as a result; however, they're further reassured that they'll regain access to their PCs and won't undergo prosecution provided a hefty monetary fine is submitted through PaySafeCard or MoneyPak.
End-users within various nations find the warning written within local language as also seemingly arriving from the respective countries' law enforcements.
It's advisable that anyone getting a similar message should first inform the police. Considering that ransom frauds similar to the current one are proliferating, it's largely possible that police by now knows about likewise attempts, thus will favor the complainants.
A few ransomware samples automatically unlock impacted PCs if an accountable payment code is typed which the victim has apparently got following his fine submission.
Thence, suppose a victim luckily on the Internet finds somebody's A/C who has entered such a code and disclosed it openly, that person may possibly unlock his PC himself. Only he should subsequently scan his machine for eliminating the ransomware as well as any other malicious programs he may discover.
» SPAMfighter News - 26-09-2013