Ransomware and Recent Variants

Discussion in 'malware problems & news' started by ronjor, Mar 31, 2016.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    From history:
    The computer virus that haunted early AIDS researchers
    http://www.nextgov.com/cybersecurity/2016/05/computer-virus-haunted-early-aids-researchers/128174/
     
  3. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,145
    Location:
    Texas
    https://www.helpnetsecurity.com/2016/05/11/cryptxxx-2-0-foils-decryption/
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Recently Discovered Mischa Ransomware

    It encrypts all Files on the connected Networkshares with endings .3P7m, .aRpt, .eQTz, 3RNu.

    And it creates two Files with the Content:


    Quote


    You became victim of the MISCHA RANSOMWARE!

    The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2.

    To purchase your key and restore your data, please follow these three easy steps:

    1. Download the Tor Browser at "
    https://www.torproject.org/".If you need help, please google for "access onion page".
    2. Visit one of the following pages with the Tor Browser:

    http://mischapuk6hyrn72.onion/3P7mas
    http://mischa5xyix2mrhd.onion/3P7mas

    3. Enter your personal decryption code there:

    The Ransomware was delivered by an E-Mail with a german domain (@maills.de) masked as an job application with a link to a file in the Cloud (magentacloud.de/share/...)


    Ref.: https://forum.eset.com/topic/8410-new-ransomware-mischa/?p=44659
    -EDIT-

    Latest on the ransomware here: http://www.bleepingcomputer.com/new...ck-and-with-a-friend-named-mischa-ransomware/

    It is Petya based.
     
    Last edited: May 12, 2016
  5. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    24,107
    Location:
    UK
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Chinese-language Ransomware Makes An Appearance
    http://blog.trendmicro.com/trendlab...chinese-language-ransomware-makes-appearance/
     
  7. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,145
    Location:
    Texas
  8. compleo

    compleo Registered Member

    Joined:
    May 3, 2016
    Posts:
    134
    In the link you provided,i clicked on "Their updated tool is called RannohDecryptor".it states "If your computer is infected with a malicious program of the Trojan-Ransom.Win32.Rannoh family".

    How does one know what they are infected with?
     
  9. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,145
    Location:
    Texas
  10. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    24,107
    Location:
    UK
  11. compleo

    compleo Registered Member

    Joined:
    May 3, 2016
    Posts:
    134
    I click on the link "RannohDecryptor can be downloded" in "post #57 which directs me to this use the utility RannohDecryptor,as an average user this tells me nothing.

    I'm used to the AV/AM scanning & doing it's thing.Now i seem to be in a position that i not only have to research what the infection is but must find the proper tool to combat the infection.

    If i use a virtual program like Returnil will this prevent the ransomware since nothing will be on theHD?
     
    Last edited: May 17, 2016
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Tech Support Scam Blurs the Line with Ransomware, Locks Users' Computers
    http://news.softpedia.com/news/tech...ransomware-locks-users-computers-504208.shtml
     
  13. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    ESET releases new decryptor for TeslaCrypt ransomware
    http://www.welivesecurity.com/2016/...ryptor-recent-variants-teslacrypt-ransomware/
     
  14. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    Ransomware Activity Spikes in March, Steadily increasing throughout 2016 « Threat Research Blog | FireEye Inc
     
  15. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    If not already mentioned, may be useful and/or interesting:
    http://ransomwaretracker.abuse.ch/blocklist/
     
  16. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
  17. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,145
    Location:
    Texas
  18. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Master decryption key released for Teslacrypt ransomware
    https://threatpost.com/master-decryption-key-released-for-teslacrypt-ransomware
     
  19. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  20. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Ransomware Adds DDoS Capabilities to Annoy Other People, Not Just You
    http://news.softpedia.com/news/rans...noying-other-people-not-just-you-504323.shtml
     
  21. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  22. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    An Effective Way To Eliminate Ransomware In Business E-mail

    I came across an interesting posting over at Beepingcomputer.com that at least is worth consideration:

    Pay close attention to the file sizes of traditional ransomware and set blacklisting for attachment sizes that will pull out most of the malware attachments while leaving most of the document size parameters the company needs. Many email protection suites neglect minimum file size setting capabilities focusing exclusively on maximum file size. We've eliminated a majority of ransomware attacks at one of our firms by setting minimum attachment size to 350k as we found in their case, most of the ransomware attachments came in under 340k while most(99%) of their inbound legitimate business attachments were between 450k-15Mb. Just some advice. We service 32,000 servers/workstations for thousands of clients and deal with this on a pretty big scale.

    Ref.: http://www.bleepingcomputer.com/forums/t/609210/two-solution-strategy-trend-cylance/?p=4003444
     
  23. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
  24. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    DMA Locker 4.0 – Known Ransomware Preparing For A Massive Distribution
    https://blog.malwarebytes.org/threa...somware-preparing-for-a-massive-distribution/
     
  25. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    https://blog.fortinet.com/2016/05/2...the-wild-catches-up-with-cryptowall-and-locky
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.