Tuesday, April 15, 2025
HomeRansomwareNew RedEye Ransomware Attack Destroy Your Computer If You will Not Pay...

New RedEye Ransomware Attack Destroy Your Computer If You will Not Pay The Ransom

Published on

SIEM as a Service

Follow Us on Google News

Newly Discovered RedEye Ransomware spreading via Twitter and target the victims to encrypt the data and lock the file to demand the ransom amount in Bitcoin.

Also, RedEye Ransomware is capable of destroying the victim’s computer after the warning time to pay the ransom amount.

This New Ransomware variant created by the same author who is behind the Annabelle ransomware that was actively spreading earlier of this year.

- Advertisement - Google News

The name RedEye was named by the ransomware author iCoreX” and this ransomware demands the ransom amount in bitcoin through the Bitcoin wallet ID and the transaction should be made by Onion Payment portal.

RedEye Ransomware threatening the victims through Twitter and it asking to check out a “scary & really nasty” sample.

RedEye Ransomware Attack Vector

Once RedEye compromises the user then it drops a file with the size of 30 MB that contains several media files, specifically images and audio files, embedded in the binary.

A dropped file contains 3  “.wav” files: child.wav, redeye.wav, suicide.wav that play a “creepy” sound and the main intention of the sound to scare the user.

RedEye Ransomware author using few other tricks such as compression and packing to evade the detection.

Once it starts the execution process, initially it will disable task manager and in this iteration, will also hide your drives.

Later it will completely encryption all the victim files using Rijndael-Algorithmus –  AES – 256 Bit encryption algorithm and lock all the disk files.

After the successful completion of the encryption process, it will display the ransom notes with detailed information about what just could be happened in victims computer.

Ransom notes containing complete information about the payment and it demands to pay 0.1 Bitcoin($765 USD) to the given address.

According to the researcher, The ransomware has several options which I won’t be showing here, but in short, it can:
  • Show encrypted files
  • Decrypt files
  • Support
  • Destroy PC
The Destroy PC option shows a GIF as background where you have the option to select “Do it” and “Close”. I won’t display the image however.

All the files RedEye Securely encrypt with AES256 and it appears to overwrite or fill files with 0 bytes, rendering the files useless and add the “.RedEye” Extension in end of all disk files.

It will lock the MBR(Master Boot Record) and destroy the complete system when the user selects  “Do it” Option or the payment time has expired.

The author, iCoreX, claims to have created Jigsaw, Annabelle, and now the RedEye ransomware – whether the former is true or not, I’ll leave in the middle. Researcher said.

Also Read:

Atlanta Police Department Ransomware Incident leads to lost Years Worth of Police Car Dashcam Videos

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work Related Files

New Gandcrab Ransomware Attack Windows Users via Compromised Websites

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their...

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage...

Over 100,000 WordPress Plugin Vulnerability Exploited Just 4 Hours After Disclosure

Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the...

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...