January 26, 2016 By Douglas Bonderud 2 min read

The Cryptowall ransomware has enjoyed significant success in the emerging malware-as-a-service (MaaS) market, going through four revisions to up its encryption game and make it even harder for companies to recover user data. According to BetaNews, however, Cryptowall 4.0 is also getting a signal boost as part of the popular Angler exploit kit (EK).

Cryptowall 4.0 Follows the Money

As noted by SecurityWeek, the new Cryptowall comes with a number of improvements over old versions. It tricks users by masquerading as an antivirus solution checker when in fact it’s busy encrypting personal data. What’s more, version 4.0 encrypts file names along with the files themselves, making it impossible for users to target specific, high-value information as their first decrypt targets.

Prices are also going up. Cryptowall now wants $500 in bitcoin, and the ransom doubles in three days, making it difficult for typical users to effectively pay off the bad guys even if they were so inclined.

But the biggest worry? Cryptowall’s Angler addition. While the Nuclear EK team added 4.0 back in November 2015, security firm Bitdefender recently announced that Angler also opted in — which is especially problematic since Angler comes with obfuscation capabilities, antivirus detection, encrypted payloads and fileless infection.

With the kit compromising upward of 500,000 machines every month and the MaaS market quickly trending toward a corporate model that follows typical profit and competition rules, the addition makes good business sense: Cryptowall 4.0 is a value-added feature that nets Angler more downloads and a bigger piece of the MaaS market pie.

Coming Soon?

While ransomware is on the way up for 2016, it’s tempting to think of the problem as largely a user issue — enterprises have more to fear from data breaches than information encryption, right? According to a recent IT Web article, this may be a false sense of security. CEO of security firm ESET Carey van Vlaanderen noted that ransomware is quickly becoming an area of concern for IT professionals and CISOs.

Already, several European banks have been targeted by ransomware scams. While they’ve been largely unsuccessful owing to banks’ better-than-average IT security, it’s only a matter of time: Stolen sensitive information is one thing, but what if enterprises couldn’t conduct day-to-day operations because critical files were encrypted and then further obfuscated or hidden? It’s a safe bet C-suites would give serious consideration to a ransom payment.

Bottom line? The Angler inclusion of Cryptowall 4.0 shows savvy business acumen. Companies need to prepare for a world where enterprise-level MaaS targets big, small and everything in between.

More from

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today