October 31, 2014 By Jaikumar Vijayan 2 min read

Microsoft researchers have observed a sharp increase in Crowti ransomware infections during October in the latest indication that spam email campaigns continue to be surprisingly effective in delivering malicious payloads on consumer and enterprise systems.

Crowti is a malware that encrypts all data files on desktops and mobile computers it infects. It then demands a ransom in bitcoins to unencrypt the files and make data accessible again. Crowti is similar to other, better-known types of ransomware such as CryptoLocker. It is distributed primarily through malicious attachments in spam email messages, though security researchers have seen it bundled in exploit kits as well.

Microsoft’s Malware Protection Center first reported Crowti in June. In the months immediately following its discovery, infection rates hovered between 1,500 and 2,500 systems per month and even dropped to below 500 per month for a brief period. However, in October, security researchers observed a sharp increase in Crowti infections as the result of new malware distribution campaigns. In mid-October, Crowti infections in Microsoft’s customer base topped 4,000 systems, with more than 71 percent of them located in the United States.

“Crowti is being distributed via spam campaigns with email attachments designed to entice the receiver to open them,” Microsoft said.

Many of the attachments have names that appear fairly innocuous and are designed to entice unwary users to open them. The commonly used attachment names that researchers discovered include names that suggest the attachment contains important phone numbers, is an incoming fax report or is an invoice of some sort.

Researchers also discovered Crowti being distributed via several exploit kits, including RIG, Nuclear and RedKit V2.

“Crowti’s primary payload is to encrypt the files on your PC,” Microsoft warned. “It usually brands itself with the name CryptoDefense or CryptoWall” after encrypting the files on a system. A message then instructs the victim to click on some provided links that direct the victim to a Tor Web page for paying up the ransom using bitcoins.

As with other ransomware, there is no guarantee that victims who ante up will regain access to their encrypted data or get their PC back to its original state.

“We do not recommend paying the ransom,” Microsoft said.

Crowti can be particularly damaging in an enterprise setting because it can be used to take vital corporate or customer data hostage.

“In most cases, ransomware such as Crowti can encrypt files and leave them inaccessible,” Microsoft warned, urging businesses and consumers to pay attention to some basic, long-standing security precautions.

In addition to not clicking on suspicious emails and attachments, users should make sure their systems and software are properly updated with all the latest security patches. Many of the exploits being used by Crowti take advantage of vulnerabilities in browser plug-ins such as Java and Flash. The flaws have all been patched long ago, so users who have installed them should be safe.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today