A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found to be active from August 7th and spreading since then.
Researchers from 360totalsecurity spotted the ransomware contains hidden configuration function and the information used for encryption. Once the ransomware execution started it executes a number of parameters to implement different functions.
Also, the Ransomware contains a hidden form that will be displayed by pressing F8, the configuration page lets users configure the following information.
Also, it contains “Exclude paths” which specifies the directories to be skipped, the excluded paths option contains the default windows files and programs path.
The encryption keys to be obtained form cosonar.mcdir.ru/get.php, in case if the fetch fails it uses default encryption key and the default user id to the process.
To implement the ransomware uses the open source library of CryptoPP and the AES algorithm used to encrypt the files.
Once the encryption completed it appends [.]keypass extension to all the files and asks victim’s to pay $300 within 72 hours to decrypt the files.
The ransomware is a global problem it emerges as a lucrative revenue model for cybercriminals. Some ransomware’s also have worm-like capabilities which enable to spread across the network.
HERMES Ransomware Spreading Through Password Protected Word Documents and XPS
Ryuk Ransomware Attack on various Enterprise Network Around the World & Earned $640,000
New KeyPass Ransomware Actively Attacking Around the World To Encrypt the Victim Files
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…