Wednesday, January 1, 2025
HomeRansomwareNew Spritecoin Ransomware Steals Browser Passwords & Asks Monero Instead of Bitcoin...

New Spritecoin Ransomware Steals Browser Passwords & Asks Monero Instead of Bitcoin to Decrypt the Files

Published on

SIEM as a Service

A New Spritecoin Ransomware Discovered which is Demanding the Monero Crypto Currency to Decrypt the victim’s files instead of traditional and widely using Ransomware payment Cryptocurrency Bitcoin.

A Monero Cryptocurrency has been created in 2014, the current price is $316 USD and it’s widely getting popular in cryptocurrency world.

Spritecoin Ransomware also Pretending as a cryptocurrency-related password store along with Monero payment and mimics as a spritecoin Cryptocurrency wallet.

- Advertisement - SIEM as a Service

It asks the user to create a desired password to connect with Blockchain but it doesn’t make any connection and it silently Encrypt the victim’s file.

Once all the victim’s file will be encrypted, it demands the ransom asks to pay via Monero cryptocurrency to decrypt the file.

Spritecoin Ransomware also spying to steal the Chrome stored credentials and once it finds no information then it moves ahead and checks the Firefox credentials and it is using SQLite to store the credentials that have been harvested from the browsers.

Also Read:  Ransomware Attack Response and Mitigation Checklist

How Does Spritecoin Ransomware Works

It mainly targeting users who all are interesting in cryptocurrency via forum spam and aslo it using social engineering techniques, without user interaction via exploits.

Some time it arrived via exploit kits, malicious crafted Excel/Word/PDF macros, or JavaScript downloaders.

Attacker manly using some professonal social engineering techniques via crafted malicious email and trick users to click on it.So Spritecoin Ransomware needs some user interaction to successfully exploit Its payload.

According to Fortinet, Initially, it arrives “SpriteCoin” package (spritecoind[.]exe) and mimics as Spritecoin crypto-currency wallet, that is actually not a cryptocurrency wallet, it was created and spread for this attack.

Once the Ransomware successfully executed, its prompt used into a page where users urged to “Enter your desired wallet password”

Once password enter, another window shows the user that, it connected into Blockchain. but it is actually a process of the encryption process of users file.

This ransomware using onion proxy for victims to communicate with an attacker.This proxy allows the victim to communicate with the attacker’s website without the need for a TOR connection.

Once the encryption process will be done, its demand  0.3 Monero – which is equivalent to $105 USD. also it generates ransom note that says “Your files are encrypted”.

Also, it transferred the harvested credentials to a remote website. aslo another twist is, if the user trying to pay the ransomware it downloads another payload.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to...

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

17M Patient Records Stolen in Ransomware Attack on Three California Hospitals

A staggering 17 million patient records, containing sensitive personal and medical information, have been...

NotLockBit – Previously Unknown Ransomware Attack Windows & macOS

A new and advanced ransomware family, dubbed NotLockBit, has emerged as a significant threat...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...