Ctblocker
Description
aka Critroni
CTB‑Locker emerged in mid‑2014, introducing a new era of ransomware by leveraging elliptic curve cryptography (ECC), Tor-based C&C communication, and Bitcoin payments—earning its name from “Curve-Tor-Bitcoin Locker.” It was packaged and sold as a ransomware kit for approximately $1,500–$3,000, allowing affiliates to deploy customized campaigns. The malware encrypts user data (including network and removable drives), changes desktop wallpapers, and appends file extensions like .CTBL, .CTB2, or randomized strings. Victims receive instructions for payment, typically within a limited timeframe, or risk permanent data loss. In 2015–2017, law enforcement and cybersecurity firms (including McAfee and Kaspersky) disrupted the network, arrested operators, and facilitated decryption tools.
External Analysis |
https://cert.gov.az/en/articles/ctb-locker-and-critroni-ransomware-information-guide-and-faq |
https://heimdalsecurity.com/blog/ctb-locker-ransomware/ |
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/advanced-threat-research/ |
https://www.eset.com/afr/about/newsroom/press-releases-afr/company/ctb-locker-ransomware-striking-in-europe-and-latin-america10/ |
Chat servers |
Screen |
http://ohmva4gbywokzqso.onion/ |
|
http://tmc2ybfqzgkaeilm.onion |
|