Terrifying Karo virus threatens to upload YOUR photos to PORN websites | Tech | Life & Style

GETTY • PICTURE POSED BY MODEL

The devastating new ransomware threatens to share your pictures online

A new strain of ransomware raises the stakes for victims by threatening to disclose private information with friends – and even distributing personal files on pornographic websites.

Dubbed Karo, the malicious software holds users to ransom, threatening to leak personal and financial data online.

Unlike the majority of ransomware, which encrypts users’ files and withholds the key until the ransom is paid, Karo compels a much higher rate of payment amongst victims by using social engineering.

In addition to threatening to permanently delete affected files, Karo also threatens to leak personal and financial data online, as well as distribute any nude photos found on the victim’s computer to the victim’s contacts and to pornographic websites.

According to analysis conducted by phishing threat management firm PhishMe, the Karo ransomware does not actually have the ability to extract the information it threatens to leak from the victims’ computer.

PHISHME

The ransomware threatens to embarrass its users by leaking personal data

The US-based company states: “it is likely that the threat actors consider the threat of disclosing victims’ private data to be sufficient leverage to compel more victims to pay the ransom.”

It’s unclear how many people have so far been affected by the Karo ransomware.

However, this technique of compelling ransomware victims to feel they have to co-operate to protect their private information is a worrying trend.

The news comes days after a new virus for Android smartphones , amongst other data.

Dubbed , the terrifying new software holds users to ransom – threatening to publish your Chrome web history, Facebook message, SMS text history, and more, to every person in your phone and email contacts.

Researchers at McAfee discovered the new variant of ransomware.

Read the full article from the Source…

Leave a Reply

Your email address will not be published. Required fields are marked *