October 31, 2014 By Jaikumar Vijayan 2 min read

Microsoft researchers have observed a sharp increase in Crowti ransomware infections during October in the latest indication that spam email campaigns continue to be surprisingly effective in delivering malicious payloads on consumer and enterprise systems.

Crowti is a malware that encrypts all data files on desktops and mobile computers it infects. It then demands a ransom in bitcoins to unencrypt the files and make data accessible again. Crowti is similar to other, better-known types of ransomware such as CryptoLocker. It is distributed primarily through malicious attachments in spam email messages, though security researchers have seen it bundled in exploit kits as well.

Microsoft’s Malware Protection Center first reported Crowti in June. In the months immediately following its discovery, infection rates hovered between 1,500 and 2,500 systems per month and even dropped to below 500 per month for a brief period. However, in October, security researchers observed a sharp increase in Crowti infections as the result of new malware distribution campaigns. In mid-October, Crowti infections in Microsoft’s customer base topped 4,000 systems, with more than 71 percent of them located in the United States.

“Crowti is being distributed via spam campaigns with email attachments designed to entice the receiver to open them,” Microsoft said.

Many of the attachments have names that appear fairly innocuous and are designed to entice unwary users to open them. The commonly used attachment names that researchers discovered include names that suggest the attachment contains important phone numbers, is an incoming fax report or is an invoice of some sort.

Researchers also discovered Crowti being distributed via several exploit kits, including RIG, Nuclear and RedKit V2.

“Crowti’s primary payload is to encrypt the files on your PC,” Microsoft warned. “It usually brands itself with the name CryptoDefense or CryptoWall” after encrypting the files on a system. A message then instructs the victim to click on some provided links that direct the victim to a Tor Web page for paying up the ransom using bitcoins.

As with other ransomware, there is no guarantee that victims who ante up will regain access to their encrypted data or get their PC back to its original state.

“We do not recommend paying the ransom,” Microsoft said.

Crowti can be particularly damaging in an enterprise setting because it can be used to take vital corporate or customer data hostage.

“In most cases, ransomware such as Crowti can encrypt files and leave them inaccessible,” Microsoft warned, urging businesses and consumers to pay attention to some basic, long-standing security precautions.

In addition to not clicking on suspicious emails and attachments, users should make sure their systems and software are properly updated with all the latest security patches. Many of the exploits being used by Crowti take advantage of vulnerabilities in browser plug-ins such as Java and Flash. The flaws have all been patched long ago, so users who have installed them should be safe.

More from

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today