Sunday, February 23, 2025
HomeRansomwareA New Ransomware Attack Posed as Windows Activator Emerging in Wild With...

A New Ransomware Attack Posed as Windows Activator Emerging in Wild With Hidden Functions

Published on

SIEM as a Service

Follow Us on Google News

A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found to be active from August 7th and spreading since then.

ransomware

Researchers from 360totalsecurity spotted the ransomware contains hidden configuration function and the information used for encryption. Once the ransomware execution started it executes a number of parameters to implement different functions.

Also, the Ransomware contains a hidden form that will be displayed by pressing F8, the configuration page lets users configure the following information.

The key of the encrypted file
The file name of extortion message
Extortion message
User’s personal id
The suffix of the added file
ransomware

Also, it contains “Exclude paths” which specifies the directories to be skipped, the excluded paths option contains the default windows files and programs path.

The encryption keys to be obtained form cosonar.mcdir.ru/get.php, in case if the fetch fails it uses default encryption key and the default user id to the process.

To implement the ransomware uses the open source library of CryptoPP and the AES algorithm used to encrypt the files.

Once the encryption completed it appends [.]keypass extension to all the files and asks victim’s to pay $300 within 72 hours to decrypt the files.

ransomware

The ransomware is a global problem it emerges as a lucrative revenue model for cybercriminals. Some ransomware’s also have worm-like capabilities which enable to spread across the network.

Also Read

HERMES Ransomware Spreading Through Password Protected Word Documents and XPS

Ryuk Ransomware Attack on various Enterprise Network Around the World & Earned $640,000

New KeyPass Ransomware Actively Attacking Around the World To Encrypt the Victim Files

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors

The notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

ShadowPad Malware Upgraded to Deliver Ransomware in Targeted Attacks

Security researchers have uncovered a significant evolution in the ShadowPad malware family, which is...