PropertyValue
rdf:type
rdfs:label
  • CTB-Locker
rdfs:comment
  • The ransomware first encrypts the files, then claiming you have 96 hours (4 days) to make the payment, and if the person doesn't send money in time, their files will be permanently be encrypted.
  • "CTB-Locker emerged in June 2014 and is one of the first ransomware variants to use Tor for its C2 infrastructure. CTB-Locker uses Tor exclusively for its C2 servers and only connects to the C2 after encrypting victims' files. Additionally, unlike other ransomware variants that utilize the Tor network for some communication, the Tor components are embedded in the CTB-Locker malware, making it more efficient and harder to detect. CTB-Locker is spread through drive-by downloads and spam emails."
dcterms:subject
dbkwik:malware/property/wikiPageUsesTemplate
Date
  • July 2014
Platform
  • Microsoft Windows
Name
  • CTB-Locker
Type
filetype
  • .EXE
abstract
  • The ransomware first encrypts the files, then claiming you have 96 hours (4 days) to make the payment, and if the person doesn't send money in time, their files will be permanently be encrypted.
  • "CTB-Locker emerged in June 2014 and is one of the first ransomware variants to use Tor for its C2 infrastructure. CTB-Locker uses Tor exclusively for its C2 servers and only connects to the C2 after encrypting victims' files. Additionally, unlike other ransomware variants that utilize the Tor network for some communication, the Tor components are embedded in the CTB-Locker malware, making it more efficient and harder to detect. CTB-Locker is spread through drive-by downloads and spam emails."