A New Ransomware Attack Posed as Windows Activator Emerging in Wild With Hidden Functions

cyber

A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found to be active from August 7th and spreading since then.

ransomware

Researchers from 360totalsecurity spotted the ransomware contains hidden configuration function and the information used for encryption. Once the ransomware execution started it executes a number of parameters to implement different functions.

Also, the Ransomware contains a hidden form that will be displayed by pressing F8, the configuration page lets users configure the following information.

The key of the encrypted file
The file name of extortion message
Extortion message
User’s personal id
The suffix of the added file

ransomware

Also, it contains “Exclude paths” which specifies the directories to be skipped, the excluded paths option contains the default windows files and programs path.

The encryption keys to be obtained form cosonar.mcdir.ru/get.php, in case if the fetch fails it uses default encryption key and the default user id to the process.

To implement the ransomware uses the open source library of CryptoPP and the AES algorithm used to encrypt the files.

Once the encryption completed it appends [.]keypass extension to all the files and asks victim’s to pay $300 within 72 hours to decrypt the files.

ransomware

The ransomware is a global problem it emerges as a lucrative revenue model for cybercriminals. Some ransomware’s also have worm-like capabilities which enable to spread across the network.

 

To read the original article

https://gbhackers.com/new-ransomware-emerging/

Laisser un commentaire

Next Post

Novel Attack Technique Uses Smart Light Bulbs to Steal Data

Researchers have determined that some light bulbs are suitable for covert data exfiltration from personal devices, and can leak multimedia preferences by recording their luminance patterns from afar. For the light sources to become an attack surface, they need to meet some requirements such as support for multimedia visualizations and […]