Friday, March 14, 2025
HomeCyber AttackFake COVID-19 Test Results Drop King Engine Ransomware

Fake COVID-19 Test Results Drop King Engine Ransomware

Published on

SIEM as a Service

Follow Us on Google News

According to Cofense Intelligence researchers, a new version of Hentai OniChan Ransomware dubbed “King Engine” is being delivered during a Coronavirus-themed phishing campaign.

The new variant called King Engine exfiltrates data and demands a huge amount as ransom, which is significantly on top of previously analysed versions of Hentai OniChan campaigns.

In previous campaigns, cybercriminals used the Berserker variant of this ransomware, which used similar phishing emails to focus on the financial and energy sectors and did not exfiltrate data. 

However, this is a tough campaign that uses the COVID-19 scare to compromise the victim’s device.

The spike in coronavirus cases during October has led to more testing and makes this sort of phishing campaign even more threatening. 

This campaign uses common tactics, techniques, and procedures (TTPs) to reach end-users and deliver Hentai OniChan Ransomware that belongs to the Quimera Ransomware family. 

During this scam, attackers are sending emails that contain the recipient’s Coronavirus test result in an attachment, which is simply a lure to convince the victim to open the attachment.

Phishing Email Delivering Hentai OniChan Ransomware

As shown in the image above, the e-mail provides a password for opening the document and mentions the name of a nurse who can answer their questions. However, it is a trick to form an e-mail that appears legitimate.

Hentai OniChan Ransomware 

Cofense Intelligence researchers stated that Hentai OniChan Ransomware was discovered in September and is found in an environment protected by Symantec, Proofpoint, Cisco IronPort, Microsoft ATP, and TrendMicro.

The downloadable PDF or HTML attachment contains components to drop and run the ransomware executable encrypting victims and holding them hostage, promising to supply decryption upon receipt of the ransom payment.

Once the target’s files are encrypted, the ransom note is provided to the victim affected which contains the way to pay the ransom, price to be paid 50 BTC (£524,725 – €584,299- $676,000), Bitcoin address, timeline, and contact email address.

Conclusion

As the COVID-19 pandemic is considered the most crucial global health calamity of the century, it is no surprise that malware authors are exploiting the pandemic. An outsized number of individuals have taken a test and awaiting results.

So if you are on the web, you are susceptible to such attacks. Ensure you don’t fall to these scare tactics and don’t download or open files from anonymous users.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Infamous Maze Ransomware Operators Shuts Down Operations

Vermont Hospitals Now Latest Victim of Ransomware Attacks

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and...

Ongoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware

Microsoft Threat Intelligence has identified an ongoing phishing campaign that began in December 2024,...

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed...