The ransomware is still one of the varieties of attack more used by the cyber criminals, and every moment are detected new forms of using this cypher against the victims. The cyber security brand Emisoft have reported the finding of a new variety of ransomware known as Ransomwared, that shows a different behavior than their similar.

 

As we know, in a ransomware attack the threatening actors cypher the files of the victims to demand a ransom in crypto coin in exchange of reestablish everything to normal. The main difference of Ransomwared, is that the operators of the attack do no demand money, they ensure the victims that they will only recover their files if they send private pictures to an address controlled by the hackers.

 

After infecting the SO, Ransomwared cyphers the files of the victim and add file extensionsl ike: “ .ransomwared or .iwanttits”. Finally, the victim finds the ransom note with the unusual request: “You were infected with a ransomware; send your tits to the following email”, said the ransom note found by the specialists in cyber security.

 

 

 

 

 

 

 

 

 

 

 

Nota de rescate Ransomwared

SOURCE: Emsisoft

 

In the report about the finding, Emsisoft says: “We are not sure about how do the threaten actors know if the pictures actually from the victim, so sending any kind of image on the internet could be enough to recover the files”.

 

Even so, the experts in cyber security managed to create a tool to delete the cypher of Ransomwared, so what they recommend is to not interact with the attackers and recover their files using the free tool, available here. In case of experiencing any problem while using the tool, contact Emsisoft.

 

Until now there’s no clue if the group of attackers are a sophisticated party or some amateurs. It is not known either major details about the deliverance methods of Ransomwared or if their developers are involved in other criminal activities.

The International Institute of Cyber Security (IICS) has begin with the chase of the most recent reports of ransomware attacks with the objective of finding potential channels of deliverance, similar file extensions and other indicators about the possible developers and their main reasons.

 

 

 

 

 

 

 

Deja un comentario