Bitcoin Ransomware Education – Crowti

Even though we have already covered various types of Bitcoin ransomware this past week, there are other variants in existence which are not as well-known to the public. Back in July of 2015, a report by Microsoft had surfaced regarding a new type of ransomware called Crowti. Similarly to other types of malware, Crowti infects computers through email attachments and asks users to pay in Bitcoin.

Also read: Royal Bank of Canada Working with Ripple on Prototype Blockchain Remittance System

Crowti Wants Your Money in Bitcoin

The biggest Bitcoin ransomware threat still comes in the form of malicious email attachments, especially when those files are labelled as “clean” by security tools. While Microsoft has added Crowti to its list of threats, there are other ways to infect a host computer than by getting a user to download an infected Crowti file directly.

Hackers have become much smarter throughout the years of Bitcoin ransomware, and Crowti can be installed as soon as the computer is infected with a different type of Trojan Horse. Regardless of how Crowti infects a PC, it will immediately mimic critical Windows processes, such as explorer.exe and svchost.exe. In this regard, Crowti resembles CryptoWall in its latest iteration.

As is the case with any form of Bitcoin ransomware, the main goal is to encrypt files on the host computer and ask for ransom. An extensive list of affected file extensions has been listed on the Microsoft website, including image, Word, and Excel files. No files are renamed during the encryption process, though, which makes it resemble an earlier version of CryptoWall.

Related Post

Once the infection process has completed, users are greeted with a screen telling them their files are locked and how they need to pay a fee to restore access. This payment link will then direct the user to a page hosted on the Tor network, where the Bitcoin funds can be transferred to the designated address. However, the ransom fee is different depending on which Crowti strain is responsible for infected the computer.

What makes this particular piece of Bitcoin ransomware so frightening is how it deleted shadow files, preventing access to encrypted data by recovering them from an earlier backup. This is not something most types of malware have done up until this point, although later versions of CryptoWall – and Crowti – do so.

Source: Microsoft

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Top 5 Modular Blockchain Tokens Less Than $1 Price Mark To Monitor In August 2025

As the blockchain ecosystem continues to evolve, modular blockchains are emerging as a promising frontier,…

2 hours ago

MetaMask Proposes Stablecoin Launch, Taps Stripe to Bridge TradFi and DeFi

MetaMask wants its own stablecoin. It’s calling it MetaMask USD (mmUSD). And if the recent…

1 day ago

Spartan, Stake & Betway: Top 2025 Crypto Gambling Prizes

Spartan’s $250K Lambo Challenge Tops 2025’s Crypto Gambling Prize War with Stake & Betway Crypto…

1 day ago

SharpLink’s Ethereum Accumulation Hits High Top With Staking Strategy

SharpLink is leaning hard into Ethereum. They buy. They stake. They hold. Ethereum currently trades…

2 days ago

Cardano Price Prediction: Is a Return to $2 Imminent or Just a FOMO Fantasy?

After months of consolidation, Cardano (ADA) is regaining investor attention thanks to renewed forecasts projecting…

3 days ago

Bitcoin and Ethereum Whales Quietly Accumulating—What Does This Mean for the Market?

Whales are back—and this time, they’re not making noise. Despite the relative calm in prices,…

3 days ago