<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img class=" size-full wp-image-1453 aligncenter" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/torrentlocker.png" alt="TorrentLocker" width="523" height="272"></p> <p>TorrentLocker is a family of file-encrypting ransomware first observed in late 2014, that is almost exclusively distributed through spam email campaigns. The ransomware is noteworthy for targeting specific geographic areas, mainly victims in the United States.</p> <!--more--><p>TorrentLocker uses AES to encrypt a wide variety of file types before a payment in <a href="https://bitcoin.org/en/">bitcoins</a> is demanded. It also goes a step further than most ransomware families by harvesting email addresses from the victim’s machine in order to further spread itself. The ransomware is named after a registry key that early variants created during execution.</p> <p>According to Eset, data gathered from TorrentLocker’s command and control servers indicate approximately 285 million documents have been encrypted to date.</p> <p>The indicators of compromise (IOCs) to be blocked are for TorrentLocker's distribution sites and command and control servers.</p> <p>ThreatSTOP customers are protected from TorrentLocker.</p></span>