{"id":5669,"date":"2012-08-15T14:52:04","date_gmt":"2012-08-15T19:52:04","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=5669"},"modified":"2012-08-15T13:54:17","modified_gmt":"2012-08-15T18:54:17","slug":"inside-a-reveton-ransomware-operation","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=5669","title":{"rendered":"Inside a \u2018Reveton\u2019 Ransomware Operation"},"content":{"rendered":"<blockquote><p>In <a title=\"http:\/\/www.fbi.gov\/news\/stories\/2012\/august\/new-internet-scam\/new-internet-scam?utm_campaign=email-Immediate&amp;utm_medium=email&amp;utm_source=fbi-top-stories&amp;utm_content=129647\" href=\"http:\/\/www.fbi.gov\/news\/stories\/2012\/august\/new-internet-scam\/new-internet-scam?utm_campaign=email-Immediate&amp;utm_medium=email&amp;utm_source=fbi-top-stories&amp;utm_content=129647\" target=\"_blank\">an alert<\/a> published last week, the FBI said that <a title=\"www.ic3.gov\" href=\"http:\/\/www.ic3.gov\/\" target=\"_blank\">The Internet Crime Complaint Center<\/a> \u2014 a partnership between the FBI and the <a title=\"http:\/\/www.nw3c.org\/\" href=\"http:\/\/www.nw3c.org\/\" target=\"_blank\">National White Collar Crime Center<\/a> \u2014 was \u201cgetting inundated with complaints\u201d from consumers targeted or victimized by the scam, which uses drive-by downloads to hijack host machines. The downloaded malware displays a threatening message (see image to the right) and blocks the user from doing anything else unless he pays the fine or finds a way to remove the program<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/krebsonsecurity.com\/2012\/08\/inside-a-reveton-ransomware-operation\/\">Inside a \u2018Reveton\u2019 Ransomware Operation \u2014 Krebs on Security<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an alert published last week, the FBI said that The Internet Crime Complaint Center \u2014 a partnership between the FBI and the National White Collar Crime Center \u2014 was \u201cgetting inundated with complaints\u201d from consumers targeted or victimized by &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=5669\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[347,101],"class_list":["post-5669","post","type-post","status-publish","format-standard","hentry","category-technical","tag-malware","tag-security"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/5669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5669"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/5669\/revisions"}],"predecessor-version":[{"id":5675,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/5669\/revisions\/5675"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5669"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}