{"id":20628,"date":"2018-07-19T07:03:11","date_gmt":"2018-07-19T11:03:11","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/coinvault-in-court\/20628\/"},"modified":"2019-11-15T22:33:40","modified_gmt":"2019-11-15T11:33:40","slug":"coinvault-in-court","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/coinvault-in-court\/20628\/","title":{"rendered":"CoinVault: Caught red-handed"},"content":{"rendered":"<p>Way back in 2015, Kaspersky Lab <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/coinvault-ransomware-removal-instruction\/8363\/\" rel=\"noopener noreferrer nofollow\">helped Dutch cyberpolice<\/a> catch the creators of one of the very first pieces of ransomware, CoinVault. The decryptor we developed for it inspired the <a target=\"_blank\" href=\"https:\/\/noransom.kaspersky.com\/\" rel=\"noopener noreferrer\">NoRansom portal<\/a>, where we upload tools for unlocking files after various encryption attacks. Although CoinVault\u2019s creators were caught a while ago, the first court hearing took place recently, and <a target=\"_blank\" href=\"https:\/\/securelist.com\/coinvault-the-court-case\/86503\/\" rel=\"noopener noreferrer\">our expert Jornt van der Wiel attended<\/a>.<\/p>\n<p>CoinVault ran riot in 2014 and 2015 through dozens of countries around the world. Our experts estimate the number of victims at more than 10,000. Behind the attacks were two Dutch brothers, aged 21 and 25, who developed and distributed the Trojan. Every victim received a ransom demand for 1 bitcoin, which at the time was worth about 200 euros. The pair snagged about 20,000 euros as a result.<\/p>\n<p>CoinVault was ahead of its time. In addition to encryption, it had features that we still see in ransomware Trojans today. For example, the victim was allowed to decrypt one file free. Mentally, this plays into the hands of the cybercriminals: When victims realize they are one click away from recovering their vital data, the temptation to pay up becomes stronger. The on-screen timer is another of CoinVault\u2019s psychological teasers, inexorably counting down to a higher ransom demand.<\/p>\n<p><strong><\/strong><\/p>\n<h2>Double Dutch<\/h2>\n<p><\/p>\n<p>We studied CoinVault and <a target=\"_blank\" href=\"https:\/\/securelist.com\/a-nightmare-on-malware-street\/67699\/\" rel=\"noopener noreferrer\">described<\/a> its structure in detail in late 2014. The malware authors took great pains to hide it from security solutions and hinder its analysis. The ransomware can determine, for example, whether it is being run in a <a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/sandbox-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">sandbox<\/a>, and its code is heavily <a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/obfuscation-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">obfuscated<\/a>.<\/p>\n<p>Nevertheless, our experts were able to get to the source code and find a clue that ultimately led to the criminals\u2019 arrest: It contained some comments in Dutch. It was fairly likely that the malware hailed from the Netherlands.<\/p>\n<p>We passed the information to the Dutch cyberpolice, and within a few months they reported the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/criminals-behind-the-coinvault-ransomware-are-busted-by-kaspersky-lab-and-dutch-police\/9886\/\" rel=\"noopener noreferrer nofollow\">successful capture<\/a> of the campaign masterminds. Thanks to our cooperation with the Dutch police, we managed to obtain the keys from the C&amp;C server and develop a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/coinvault-ransomware-removal-instruction\/8363\/\" rel=\"noopener noreferrer nofollow\">data decryption tool<\/a>.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Lady Justice weighs the evidence<\/h3>\n<p><\/p>\n<p>The police collected almost 1,300 statements from victims of the ransomware. Some of them appeared in court personally to demand compensation. One victim, for example, had their vacation ruined by the ransomware. They estimated the damage at 5,000 euros, saying that this sum would enable them to pay for another trip.<\/p>\n<p>Another victim asked for the ransom to be paid back in the same coin \u2014 bitcoin. Since the attack, the <a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/cryptocurrency-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">cryptocurrency<\/a> exchange rate has risen almost thirtyfold, so if the court satisfies the claim, it will be the first time that an injured party has earned money from a ransomware attack.<\/p>\n<p>At the recent hearing, the prosecutors demanded punishment in the form of three months\u2019 imprisonment, followed by a nine-month suspended sentence and 240 hours\u2019 community service. The defense asked the court not to put the brothers behind bars, arguing that the defendants had cooperated with the investigation, plus one is irreplaceable in his current job and the other is in college. The verdict will be delivered at the next hearing, on July 26.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<p><strong><\/strong><\/p>\n<h3>Trespassers will be prosecuted<\/h3>\n<p><\/p>\n<p>We always say that giving in to criminals only encourages them. The trial of the CoinVault creators shows that even seemingly anonymous cybercriminals cannot escape punishment. But instead of waiting three years for justice, it\u2019s better to protect yourself in advance. Remember our standard tips:<\/p>\n<ul>\n<li>Don\u2019t click on suspicious links and don\u2019t open suspicious e-mail attachments.<\/li>\n<li>Make regular backups of important files.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com.au\/plus?icid=au_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">a reliable security solution<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.<\/p>\n","protected":false},"author":2484,"featured_media":20629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1061,1609,1680,574,772,420,2933,723],"class_list":{"0":"post-20628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-coinvault","9":"tag-court","10":"tag-cryptors","11":"tag-news-2","12":"tag-police","13":"tag-ransomware","14":"tag-trial","15":"tag-trojans"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/coinvault-in-court\/20628\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/coinvault-in-court\/13700\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/coinvault-in-court\/11470\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/coinvault-in-court\/15765\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/coinvault-in-court\/14041\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/coinvault-in-court\/13176\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/coinvault-in-court\/16535\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/coinvault-in-court\/15993\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/coinvault-in-court\/20919\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/coinvault-in-court\/23123\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/coinvault-in-court\/10743\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/coinvault-in-court\/10556\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/coinvault-in-court\/9494\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/coinvault-in-court\/17298\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/coinvault-in-court\/20813\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/coinvault-in-court\/16997\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/coinvault-in-court\/20624\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=20628"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20628\/revisions"}],"predecessor-version":[{"id":24026,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20628\/revisions\/24026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/20629"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=20628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=20628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=20628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}