Monday, April 28, 2025
HomeRansomwareNew RedEye Ransomware Attack Destroy Your Computer If You will Not Pay...

New RedEye Ransomware Attack Destroy Your Computer If You will Not Pay The Ransom

Published on

SIEM as a Service

Follow Us on Google News

Newly Discovered RedEye Ransomware spreading via Twitter and target the victims to encrypt the data and lock the file to demand the ransom amount in Bitcoin.

Also, RedEye Ransomware is capable of destroying the victim’s computer after the warning time to pay the ransom amount.

This New Ransomware variant created by the same author who is behind the Annabelle ransomware that was actively spreading earlier of this year.

- Advertisement - Google News

The name RedEye was named by the ransomware author iCoreX” and this ransomware demands the ransom amount in bitcoin through the Bitcoin wallet ID and the transaction should be made by Onion Payment portal.

RedEye Ransomware threatening the victims through Twitter and it asking to check out a “scary & really nasty” sample.

RedEye Ransomware Attack Vector

Once RedEye compromises the user then it drops a file with the size of 30 MB that contains several media files, specifically images and audio files, embedded in the binary.

A dropped file contains 3  “.wav” files: child.wav, redeye.wav, suicide.wav that play a “creepy” sound and the main intention of the sound to scare the user.

RedEye Ransomware author using few other tricks such as compression and packing to evade the detection.

Once it starts the execution process, initially it will disable task manager and in this iteration, will also hide your drives.

Later it will completely encryption all the victim files using Rijndael-Algorithmus –  AES – 256 Bit encryption algorithm and lock all the disk files.

After the successful completion of the encryption process, it will display the ransom notes with detailed information about what just could be happened in victims computer.

Ransom notes containing complete information about the payment and it demands to pay 0.1 Bitcoin($765 USD) to the given address.

According to the researcher, The ransomware has several options which I won’t be showing here, but in short, it can:
  • Show encrypted files
  • Decrypt files
  • Support
  • Destroy PC
The Destroy PC option shows a GIF as background where you have the option to select “Do it” and “Close”. I won’t display the image however.

All the files RedEye Securely encrypt with AES256 and it appears to overwrite or fill files with 0 bytes, rendering the files useless and add the “.RedEye” Extension in end of all disk files.

It will lock the MBR(Master Boot Record) and destroy the complete system when the user selects  “Do it” Option or the payment time has expired.

The author, iCoreX, claims to have created Jigsaw, Annabelle, and now the RedEye ransomware – whether the former is true or not, I’ll leave in the middle. Researcher said.

Also Read:

Atlanta Police Department Ransomware Incident leads to lost Years Worth of Police Car Dashcam Videos

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work Related Files

New Gandcrab Ransomware Attack Windows Users via Compromised Websites

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

Threat Actors Target Organizations in Thailand with Ransomware Attacks

Thailand is experiencing a significant escalation in ransomware attacks, with both state-sponsored advanced persistent...

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...