The IT Law Wiki


32,080pages on
this wiki
Add New Page
Add New Page Talk0

Overview Edit

"CTB-Locker emerged in June 2014 and is one of the first ransomware variants to use Tor for its C2 infrastructure. CTB-Locker uses Tor exclusively for its C2 servers and only connects to the C2 after encrypting victims' files. Additionally, unlike other ransomware variants that utilize the Tor network for some communication, the Tor components are embedded in the CTB-Locker malware, making it more efficient and harder to detect. CTB-Locker is spread through drive-by downloads and spam emails."[1]

References Edit

  1. How to Protect Your Networks from Ransomware, at 7.

Also on Fandom

Random Wiki