TorrentLocker: Racketeering ransomware disassembled by ESET experts

Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.

TorrentLocker white paperIn a technical white paper, researcher Marc-Étienne Léveillé describes how the TorrentLocker family of ransomware (which is known as Win32/Filecoder.DI by ESET security products, but which the malware’s creators would apparently rather be known as “Racketeer”) has evolved since its first sighting in February 2014.

As months have passed, TorrentLocker (named because early versions of the malware set a Registry entry which referenced the Bit Torrent application) has become more sophisticated and automated its systems.

For instance, in September Finnish researchers at Nixu Oy detailed a method by which victims of TorrentLocker could recover the contents of their encrypted files, without handing any money over to the criminals behind the attack.

Predictably, once they realised that it was possible to extract the keystream, the authors of TorrentLocker released a new version which changed their encryption methodology, and shut the door on the loophole immediately.

Another example is that at first victims were required to send emails to the criminals behind the malware to make payments and request decryption keys. Today, this has been automated via a user-friendly payment page, explaining how to pay with Bitcoins to receive the decryption software.

TorrentLocker payment page

But although the malware has become more sophisticated, in other ways it appears less professional.

Some of the screens displayed by TorrentLocker refer to “CryptoLocker” instead. Is this a case of laziness on the malware creator’s part, or a deliberate attempt to dupe users into searching for information about an unrelated (albeit just as notorious) piece of ransomware?

Furthermore, the gang behind TorrentLocker does not appear interested in maximising its potential pool of victims by striking at computer users around the globe.

Infected countries

ESET researchers have determined that spam campaigns used to distribute TorrentLocker have only targeted specific countries.

Typically, the malicious emails arrive in the form of a bogus message claiming to relate to an unpaid invoice, the delivery of a package, or a fine for an unpaid speeding ticket.

Malicious webpage, posing as government fine

The following list of countries targeted by the malicious email campaigns is notable for its surprising exceptions (the United States, for instance, is nowhere to be seen):

  • Australia
  • Austria
  • Canada
  • Czech Republic
  • Italy
  • Ireland
  • France
  • Germany
  • Netherlands
  • New Zealand
  • Spain
  • Turkey
  • United Kingdom

What the technical paper makes clear, however, is that the rewards to be made through the TorrentLocker malware are considerable. ESET’s research indicates that even though a mere 1.45% of victims are paying the ransom (570 of 39,670 infected systems) that has still made the criminals between $292,700 and $585,401 in Bitcoins.

And, according to data gathered from TorrentLocker’s C&C (command and control) servers, a jaw-dropping 284,716,813 documents have been encrypted to date.

One has to hope that a fair proportion of the victims have access to a recent, clean backup from which they can restore their precious data.

For much more detailed information about TorrentLocker, be sure to have a look at the technical white paper from ESET.

Author Graham Cluley, We Live Security

  • Americus Citizenus2

    I would just like these POCs physical locations and addresses so I can pay them a visit and give them “a little something” for Christmas!

    • ShaunTheSheep

      Hey, we got ourselves another badass over here!

  • CO

    Most are NATO counties in Europe ?

  • Lucy Farrah DeMonique

    Cyber cops need to nab those crooks and take a byte out of crime!

    • Coyote

      Love the pun. Interestingly, to those who have been in to security long enough, there are TWO puns in there. Actually, apparently it is still available. (To those who don’t know and have any interest in the past: COPS refers to specific software, faq here – )

    • ShaunTheSheep

      Well that would be their job but hopefully you can email them and give them a heads up? While you’re at it maybe phone the police and tell them you saw a TV show about criminals and perhaps they can go and arrest them too?

Follow us

Copyright © 2018 ESET, All Rights Reserved.