Sunday, November 17, 2024
HomeRansomwareNew RedEye Ransomware Attack Destroy Your Computer If You will Not Pay...

New RedEye Ransomware Attack Destroy Your Computer If You will Not Pay The Ransom

Published on

Newly Discovered RedEye Ransomware spreading via Twitter and target the victims to encrypt the data and lock the file to demand the ransom amount in Bitcoin.

Also, RedEye Ransomware is capable of destroying the victim’s computer after the warning time to pay the ransom amount.

This New Ransomware variant created by the same author who is behind the Annabelle ransomware that was actively spreading earlier of this year.

- Advertisement - SIEM as a Service

The name RedEye was named by the ransomware author iCoreX” and this ransomware demands the ransom amount in bitcoin through the Bitcoin wallet ID and the transaction should be made by Onion Payment portal.

RedEye Ransomware threatening the victims through Twitter and it asking to check out a “scary & really nasty” sample.

RedEye Ransomware Attack Vector

Once RedEye compromises the user then it drops a file with the size of 30 MB that contains several media files, specifically images and audio files, embedded in the binary.

A dropped file contains 3  “.wav” files: child.wav, redeye.wav, suicide.wav that play a “creepy” sound and the main intention of the sound to scare the user.

RedEye Ransomware author using few other tricks such as compression and packing to evade the detection.

Once it starts the execution process, initially it will disable task manager and in this iteration, will also hide your drives.

Later it will completely encryption all the victim files using Rijndael-Algorithmus –  AES – 256 Bit encryption algorithm and lock all the disk files.

After the successful completion of the encryption process, it will display the ransom notes with detailed information about what just could be happened in victims computer.

Ransom notes containing complete information about the payment and it demands to pay 0.1 Bitcoin($765 USD) to the given address.

According to the researcher, The ransomware has several options which I won’t be showing here, but in short, it can:
  • Show encrypted files
  • Decrypt files
  • Support
  • Destroy PC
The Destroy PC option shows a GIF as background where you have the option to select “Do it” and “Close”. I won’t display the image however.

All the files RedEye Securely encrypt with AES256 and it appears to overwrite or fill files with 0 bytes, rendering the files useless and add the “.RedEye” Extension in end of all disk files.

It will lock the MBR(Master Boot Record) and destroy the complete system when the user selects  “Do it” Option or the payment time has expired.

The author, iCoreX, claims to have created Jigsaw, Annabelle, and now the RedEye ransomware – whether the former is true or not, I’ll leave in the middle. Researcher said.

Also Read:

Atlanta Police Department Ransomware Incident leads to lost Years Worth of Police Car Dashcam Videos

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work Related Files

New Gandcrab Ransomware Attack Windows Users via Compromised Websites

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market.Unlike traditional standalone ransomware sales, RaaS...

A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack

The "You Dun" hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging...