October 31, 2014 By Jaikumar Vijayan 2 min read

Microsoft researchers have observed a sharp increase in Crowti ransomware infections during October in the latest indication that spam email campaigns continue to be surprisingly effective in delivering malicious payloads on consumer and enterprise systems.

Crowti is a malware that encrypts all data files on desktops and mobile computers it infects. It then demands a ransom in bitcoins to unencrypt the files and make data accessible again. Crowti is similar to other, better-known types of ransomware such as CryptoLocker. It is distributed primarily through malicious attachments in spam email messages, though security researchers have seen it bundled in exploit kits as well.

Microsoft’s Malware Protection Center first reported Crowti in June. In the months immediately following its discovery, infection rates hovered between 1,500 and 2,500 systems per month and even dropped to below 500 per month for a brief period. However, in October, security researchers observed a sharp increase in Crowti infections as the result of new malware distribution campaigns. In mid-October, Crowti infections in Microsoft’s customer base topped 4,000 systems, with more than 71 percent of them located in the United States.

“Crowti is being distributed via spam campaigns with email attachments designed to entice the receiver to open them,” Microsoft said.

Many of the attachments have names that appear fairly innocuous and are designed to entice unwary users to open them. The commonly used attachment names that researchers discovered include names that suggest the attachment contains important phone numbers, is an incoming fax report or is an invoice of some sort.

Researchers also discovered Crowti being distributed via several exploit kits, including RIG, Nuclear and RedKit V2.

“Crowti’s primary payload is to encrypt the files on your PC,” Microsoft warned. “It usually brands itself with the name CryptoDefense or CryptoWall” after encrypting the files on a system. A message then instructs the victim to click on some provided links that direct the victim to a Tor Web page for paying up the ransom using bitcoins.

As with other ransomware, there is no guarantee that victims who ante up will regain access to their encrypted data or get their PC back to its original state.

“We do not recommend paying the ransom,” Microsoft said.

Crowti can be particularly damaging in an enterprise setting because it can be used to take vital corporate or customer data hostage.

“In most cases, ransomware such as Crowti can encrypt files and leave them inaccessible,” Microsoft warned, urging businesses and consumers to pay attention to some basic, long-standing security precautions.

In addition to not clicking on suspicious emails and attachments, users should make sure their systems and software are properly updated with all the latest security patches. Many of the exploits being used by Crowti take advantage of vulnerabilities in browser plug-ins such as Java and Flash. The flaws have all been patched long ago, so users who have installed them should be safe.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today