Microsoft researchers have observed a sharp increase in Crowti ransomware infections during October in the latest indication that spam email campaigns continue to be surprisingly effective in delivering malicious payloads on consumer and enterprise systems.

Crowti is a malware that encrypts all data files on desktops and mobile computers it infects. It then demands a ransom in bitcoins to unencrypt the files and make data accessible again. Crowti is similar to other, better-known types of ransomware such as CryptoLocker. It is distributed primarily through malicious attachments in spam email messages, though security researchers have seen it bundled in exploit kits as well.

Microsoft’s Malware Protection Center first reported Crowti in June. In the months immediately following its discovery, infection rates hovered between 1,500 and 2,500 systems per month and even dropped to below 500 per month for a brief period. However, in October, security researchers observed a sharp increase in Crowti infections as the result of new malware distribution campaigns. In mid-October, Crowti infections in Microsoft’s customer base topped 4,000 systems, with more than 71 percent of them located in the United States.

“Crowti is being distributed via spam campaigns with email attachments designed to entice the receiver to open them,” Microsoft said.

Many of the attachments have names that appear fairly innocuous and are designed to entice unwary users to open them. The commonly used attachment names that researchers discovered include names that suggest the attachment contains important phone numbers, is an incoming fax report or is an invoice of some sort.

Researchers also discovered Crowti being distributed via several exploit kits, including RIG, Nuclear and RedKit V2.

“Crowti’s primary payload is to encrypt the files on your PC,” Microsoft warned. “It usually brands itself with the name CryptoDefense or CryptoWall” after encrypting the files on a system. A message then instructs the victim to click on some provided links that direct the victim to a Tor Web page for paying up the ransom using bitcoins.

As with other ransomware, there is no guarantee that victims who ante up will regain access to their encrypted data or get their PC back to its original state.

“We do not recommend paying the ransom,” Microsoft said.

Crowti can be particularly damaging in an enterprise setting because it can be used to take vital corporate or customer data hostage.

“In most cases, ransomware such as Crowti can encrypt files and leave them inaccessible,” Microsoft warned, urging businesses and consumers to pay attention to some basic, long-standing security precautions.

In addition to not clicking on suspicious emails and attachments, users should make sure their systems and software are properly updated with all the latest security patches. Many of the exploits being used by Crowti take advantage of vulnerabilities in browser plug-ins such as Java and Flash. The flaws have all been patched long ago, so users who have installed them should be safe.

More from

Securing Your SAP Environments: Going Beyond Access Control

Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the new opportunities that attackers exploit to achieve a system breach. Recent attacks related to corrupt data, stealing personal information and escalating privileges for remote code execution all highlight the new and varied entry points threat actors have taken advantage of. Attackers with the appropriate skills could be able to exploit…

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

Abuse of Privilege Enabled Long-Term DIB Organization Hack

From November 2021 through January 2022, the Cybersecurity and Infrastructure Security Agency (CISA) responded to an advanced cyberattack on a Defense Industrial Base (DIB) organization’s enterprise network. During that time frame, advanced persistent threat (APT) adversaries used an open-source toolkit called Impacket to breach the environment and further penetrate the organization’s network. Even worse, CISA reported that multiple APT groups may have hacked into the organization’s network. Data breaches such as these are almost always the result of compromised endpoints…