Home / Tech News / CryptoLocker look-alike searches for and encrypts PC game files (Sean Gallagher/Ars Technica)

CryptoLocker look-alike searches for and encrypts PC game files (Sean Gallagher/Ars Technica)

If you’re a gamer (or anyone else), this is not a screen you want to see. Bromium Labs Crypto-based “ransomware” has become a lucrative business for cybercriminals. Since the arrival of CryptoLocker on the scene last year, a number of copycat malware packages have appeared to compete in the cyber-extortion market, encrypting victims’ photos and other personal files with a key that will be destroyed if they don’t contact the malware’s operators and pay up. Recently, a new variant has emerged that seeks to raise the stakes with a particular class of victim by specifically seeking out files related to a number of popular PC games, as well as Valve’s Steam gaming platform. The malware, which is a variant of the crypt-ransomware called TeslaCrypt, superficially looks like CryptoLocker. But according to a number of security researchers who have analyzed the malware, it shares little code with CryptoLocker or its more well-known successor CryptoWall. And while it will also will target photos and documents, as well as iTunes-related files, as Bromium security researcher Vadim Kotov noted in an analysis on Bromium Labs’ blog , TeslaCrypt also includes code that specifically looks for files related to more than 40 specific PC games, gaming platforms, and game developer tools. The games include both single player and multiplayer games, though it isn’t clear how targeting some of the multiplayer games would affect users other than requiring a re-install. The games targeted include a mix of older and newer titles— for example, Blizzard’s StarCraft II and WarCraft III real-time strategy games and its World of Warcraft online game are targeted. Also on TeslaCrypt’s hit list: Bioshock 2, Call of Duty, DayZ, Diablo, Fallout 3, League of Legends, F.E.A.R, S.T.A.L.K.E.R, Minecraft, Metro 2033, Half-Life 2, Dragon Age: Origins, Resident Evil 4, World of Tanks, Metin 2, and The Elder Scrolls (specifically, Skyrim-related files), as well as Star Wars: The Knights Of The Old Republic. There’s also code that searches for files associated with games from specific companies that affect a wide range of titles, including a variety of games from EA Sports, Valve, and Bethesda, and Valve’s Steam gaming platform. And the game development tools RPG Maker, Unity3D and Unreal Engine are targeted as well. These files are all targeted by their file extension, Kotov reported. “Concretely these are user profile data, saved games, maps, mods, etc,” he said.

Visit site:
CryptoLocker look-alike searches for and encrypts PC game files (Sean Gallagher/Ars Technica)

About Tech News Reporter

Check Also

Mark Zuckerberg to Apologize Again, This Time to European Parliament

Facebook’s chief executive is expected to strike a conciliatory tone about user data on Tuesday when he speaks to members of the European Parliament.

Leave a Reply

Your email address will not be published. Required fields are marked *