Sunday, April 27, 2025
HomeComputer SecurityGandCrab Ransomware Attack Users & Demand $500 in Bitcoin via sextortion Blackmail...

GandCrab Ransomware Attack Users & Demand $500 in Bitcoin via sextortion Blackmail Email

Published on

SIEM as a Service

Follow Us on Google News

GandCrab ransomware currently distributing via Blackmail Email that claims “users data have been compromised and threaten to expose their private data in online” in order to demand ransom amount.

The recently observed campaign distributed along with solicited links that pointed to AZORult information stealer that leads to dropping GandCrab ransomware in order to encrypt the data.

sextortion Email nowadays widely distributing via mail to blackmailing innocent victims and intimate them to pay demanding amount to avoid publication of their stolen private information while they access the pornographic content online.

- Advertisement - Google News

But the mostly fraudulent who climes that they have users private information mostly not be true but they take advantage of victims fear and demand the money.

Earlier days of this Blackmail Email campaign doesn’t have any links but currently attackers using the same type of emails to drop malware and ransomware.

Current Blackmail Email Campaign

An ongoing blackmail email campaign sent to thousands of victims in U.S along with embedded links that pointed to drops the information stealer malware AZORult.

Attackers are using various social engineering techniques with below email and trick users to click on it to drop that claims the proof of victims illicit activities.

According to Proofpoint, The supposed password for the potential victim’s email address in this case appears to be the same as the email account. Therefore, in this case it may simply be a bluff and the attacker does not actually possess the victim’s password.

Once Victim click the link then its it leads to install the GandCrab ransomware and the attacker demands a payment of $500 in Bitcoin or DASH.

Attackers using stolen passwords and other social engineering tricks to convince recipients that their reputations are actually at risk. Researchers said.

  • Assume the sender does not actually possess screenshots or video of any compromising activity
  • Should not click any links or open attachments to verify the sender’s claims.

Common sextortion Blackmail Email bodies

  1. A statement that the recipient’s computer has been compromised with some type of spyware or a keylogger
  2. To make the email more believable often a method such as the following is used:
    1. A password associated with the email account, sometimes obtained via previous data breaches is included
    2. Information that can be obtained from open sources is included such as spouse, employer, or occupation
  3. Accusations of impropriety online or of inappropriate files stored on the device
  4. A demand for a payment to a Bitcoin wallet to avoid having evidence of the purported impropriety exposed on the Internet or sent to the recipient’s contacts.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

North Korean APT Hackers Pose as Companies to Spread Malware to Job Seekers

Silent Push Threat Analysts have uncovered a chilling new cyberattack campaign orchestrated by the...

Threat Actors Target Organizations in Thailand with Ransomware Attacks

Thailand is experiencing a significant escalation in ransomware attacks, with both state-sponsored advanced persistent...