The Latest in IT Security

Critoni Ransomware Communicates Through Tor Anonymity Network

19
Jul
2014

A new ransomware called Critoni, is up for sale on the underground forums, its vendors touting it as a new generation of Cryptolocker as it uses the Tor network to anonymize its communication with the command and control server.

The purpose of the malicious kit is to encrypt various types of files, documents and images among them, and ask for a ransom fee to revert the locking process.

The post was discovered by French security researcher that goes by the name of Kafeine, who says that the…

Comments are closed.

Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments