Tuesday, February 11, 2025
HomeRansomwareIndian Hackers Group Hacked & Encrypt Pakistan Website Files Using KCW Ransomware

Indian Hackers Group Hacked & Encrypt Pakistan Website Files Using KCW Ransomware

Published on

SIEM as a Service

Follow Us on Google News

One of the famous Indian Hacking group called “Kerala Cyber Warriors” compromised Pakistan based Welfare organization website and encrypt the website files using KCW Ransomware.

This group of hackers actively attacking over 1000 of Pakistan and Bangladesh based websites such as government websites, airport websites for various motivations.

KCW (Kerala Cyber Warriors) Ransomware used to encrypting the website files using encryption algorithm and then appends file names with .kcwenc to demand the ransom amount.

Attacker Initially defaced the website using the existing vulnerabilities in the website such as SQL injection and then find the loopholes in order to access the files.

Also Read: Ransomware Attack Response and Mitigation Checklist

Once they reached the web file then inject the ransomware called KCW(Kerala Cyber Warriors) to Start the encryption process.

One of the security  Researchers initially reported on Twitter said, “Interesting story behind it involving Indian cyber-vigilantes compromising Pakistani web hosts. A complete mess dev-wise, but cool backstory. Hadn’t seen this until today.”

Most of the import files that belong to compromise website has been locked and changes file extension as ..kcwenc. Not all the files have been encrypted, there are some folder files still can be publicly accessible by anyone.

Hackers leave the ransom note in the file name called kcwdecrypt.php that contain a complete information about the contact, who they are and how many of them were involved in this attack with each person’s dummy name.

GH057_R007 | 8L4CK_P3RL | F0R81DD3N_H4CX3R | RED LIZARD | S3CU617Y_R1PP36 | 4N0N_5P1D3R | RED_LIZARDCH@CH_4-RC7 | M3GA_M1ND | D0PP3l_64N63R | K1LL3R_C0BR4{PP} | C0D3_PH03N1X | 5H4D0W_HUN73rB4HZ1 | 4S7R4 | V33R4PP4N | C47_HUN73R | CJ_N4P573R | 5H1VJ1_M4H4R4J | PH4N70M

Basically ransomware attacks main motivation will be money and the hackers usually demand anonymous cryptocurrency such as Bitcoin, but this attacker didn’t demand any ransom amount instead of the request to contact them for the decryption key.

Also, they have given the contact information that point out to their Facebook Page and the main motivation of this attack was unclear. and also their hackers team has been listed on Wikipedia page.

The compromised website is still not has been recovered and the website owners are not taking any action regarding this attack.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network

Sensitive credentials from Cisco's internal network and domain infrastructure were reportedly made public due...