Kovter Ransomware Massively Increases During Q2-2014, Says Damballa
Damballa the threat protection company has just released the 'Q2 State of Infections Report' wherein it states that ransomware contaminations significantly increased during Q2-2014 counting 43,000-or-more per day when the maximum activity occurred from Kovter an infamous ransom malware, published infosecurity-magazine.com, August 13, 2014.
Damballa's aforementioned second quarter report asserts that on one specified date during the period, Kovter contaminations spiked to a maximum counting 43,713, with a mean per day contaminations growing 153% during April-May alone.
Moreover, when it was June, the mean per day contamination counted 37,733, an enormous rise from 9,783 of April as also from 24,825 of May accounting for 52% growth.
From the date of its first detection during the year 2013, Kovter victimized numerous users. This special sample of ransomware characteristically attacks Web-surfers visiting adult sites. Once active, the malware locks the computer alternatively telephone followed with exhibiting a message alleging violation of law by the user and that he'll have to make certain payment towards fine for the breach along with getting his device unlocked.
The report explains that no matter what the victim really watches online, Kovter manages in providing evidence of illegal operations as well as demands a hefty sum for apparently eschewing penalties or incarceration. Therefore, victims must especially be aware that even if they make the ransom payment it won't lead to the malware's removal from their PCs alternatively the systems' functions getting restored. V3.co.uk published this, August 13, 2014.
According to chief technology officer Brian Foster of Damballa, Kovter's increased activity maybe because of a shortfall caused from GameoverZeus' latest shutdown initiative. V3.co.uk published this.
Foster says cyber-criminals use ransomware as a most effective means for making money, with the threat hitting the headlines. Being profit-motivated, these people stick to anything that serves the purpose. The spike simply exudes opportunism by the malware-controllers, Foster concludes.
The Damballa report further examines contamination figures for businesses while discloses that any organization's scale doesn't impact its number of threat attacks. During Q2-2014, Damballa witnessed organizations having 200K+ computers encounter just a few such attacks while those having less than 600 PCs encounter remarkably huge numbers of contaminations.
» SPAMfighter News - 23-08-2014