• No events
AEC v1.0.4

Cyber Security Info

New crypto ransomware uses TOR

July 23, 2014

Share Button

The demise of CryptoLocker by the FBI opened the market for many similar tools. One of them, Citroni, was described by server Malware don’t need Coffee. Citroni contains the features shared by most examples of such malware type. It allows for both online and offline decryption of files. In the offline case it communicates with user via TOR network. The ransom may be paid only in Bitcoins equivalent to 0 to 75 USD. The variation of ransom may depend on the number of files encrypted. As well as other ransomware types, Citron also offers “late“ payment of ransom by the same way as when paying the ransom offline.

Share Button