-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Awareness System
Recent Reports of DHS-Themed Ransomware (UPDATE)
Original release date: March 21, 2013 | Last revised: March 22, 2013
US-CERT has received reports of apparently DHS-themed ransomware
occurring in the wild. Users who are being targeted by the ransomware
receive an email message claiming that use of their computer has been
suspended and that the user must pay a fine to unblock it. The
ransomware falsely claims to be from the U.S. Department of Homeland
Security and the National Cyber Security Division.
Users who are infected with the malware should consult with a reputable
security expert to assist in removing the malware, or perform a clean
reinstallation of their OS after formatting their computer's hard drive.
US-CERT and DHS encourage users and administrators to use caution when
encountering these types of email messages and take the following
preventive measures to protect themselves from phishing scams and
malware campaigns that attempt to frighten and deceive a recipient for
the purpose of illegal gain.
Do not click on or submit any information to webpages.
Do not follow unsolicited web links in email messages.
Use caution when opening email attachments. Refer to the Security Tip
Using Caution with Email Attachments for more information on safely
handling email attachments.
Maintain up-to-date antivirus software.
Users who are infected should change all passwords AFTER removing the
malware from their system.
Refer to the Recognizing and Avoiding Email Scams (pdf) document for
more information on avoiding email scams.
Refer to the Security Tip Avoiding Social Engineering and Phishing
Attacks for more information on social engineering attacks.
Relevant URL(s):
<http://www.us-cert.gov/cas/ tips/ST04-014.html>
<http://www.us-cert.gov/ reading_room/emailscams_0905. pdf>
<http://www.us-cert.gov/cas/ tips/ST04-010.html>
______________________________ ______________________________ ________
Produced by US-CERT, a government organization.
______________________________ ______________________________ ________
This product is provided subject to this Notification:
http://www.us-cert.gov/ privacy/notification/
Privacy & Use policy:
http://www.us-cert.gov/ privacy/
This document can also be found at
http://www.us-cert.gov/ncas/ current-activity/2013/03/21/ Recent-Reports-DHS-themed- Ransomware
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBUUyAyXdnhE8Qi3ZhAQK0bQ f8CHOu92BDmiazVU33bkrXQS9NRHSg aPae
Ipu227z8BOJZC04akv9fPt9+ CY5NIR8iJa0vDVBgGy6o4yYJ4Le8oP YlwFiHdv+T
/ dQrXYlMgCBojgUWEZ1RgAgBY7LJYHs XuSoZ5+ qehWCtMFznu92CBhxjNBIGb6Jl
gXG6XXk9+4hti7ip7M+51FV/ 3OmHicHa/PFo9+G8h1oT5+y7/ 6nukF6pIxpbKILd
tpBTUQVQEHP0KkG77o7bedUeUUV1Gb T3adQW04W8YfNbm/4I3kAKtecgx/ XD9std
5yDKF5wbg02iJaMlapXcCTxjRtgksp Wq4vXYmriHvpVNfCfmm/DQHA==
=/Bfi
-----END PGP SIGNATURE-----
Hash: SHA1
National Cyber Awareness System
Recent Reports of DHS-Themed Ransomware (UPDATE)
Original release date: March 21, 2013 | Last revised: March 22, 2013
US-CERT has received reports of apparently DHS-themed ransomware
occurring in the wild. Users who are being targeted by the ransomware
receive an email message claiming that use of their computer has been
suspended and that the user must pay a fine to unblock it. The
ransomware falsely claims to be from the U.S. Department of Homeland
Security and the National Cyber Security Division.
Users who are infected with the malware should consult with a reputable
security expert to assist in removing the malware, or perform a clean
reinstallation of their OS after formatting their computer's hard drive.
US-CERT and DHS encourage users and administrators to use caution when
encountering these types of email messages and take the following
preventive measures to protect themselves from phishing scams and
malware campaigns that attempt to frighten and deceive a recipient for
the purpose of illegal gain.
Do not click on or submit any information to webpages.
Do not follow unsolicited web links in email messages.
Use caution when opening email attachments. Refer to the Security Tip
Using Caution with Email Attachments for more information on safely
handling email attachments.
Maintain up-to-date antivirus software.
Users who are infected should change all passwords AFTER removing the
malware from their system.
Refer to the Recognizing and Avoiding Email Scams (pdf) document for
more information on avoiding email scams.
Refer to the Security Tip Avoiding Social Engineering and Phishing
Attacks for more information on social engineering attacks.
Relevant URL(s):
<http://www.us-cert.gov/cas/
<http://www.us-cert.gov/
<http://www.us-cert.gov/cas/
______________________________
Produced by US-CERT, a government organization.
______________________________
This product is provided subject to this Notification:
http://www.us-cert.gov/
Privacy & Use policy:
http://www.us-cert.gov/
This document can also be found at
http://www.us-cert.gov/ncas/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBUUyAyXdnhE8Qi3ZhAQK0bQ
Ipu227z8BOJZC04akv9fPt9+
/
gXG6XXk9+4hti7ip7M+51FV/
tpBTUQVQEHP0KkG77o7bedUeUUV1Gb
5yDKF5wbg02iJaMlapXcCTxjRtgksp
=/Bfi
-----END PGP SIGNATURE-----