• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

CommonRansomware: A strain that also demands RDP credentials for decryption

November 9, 2018Simeon Georgiev

Every other day, cybersecurity researchers discover new cryptovirological strains. In most of the cases, the discovered cryptovirological strains show regular activity i.e. locking down the data on targeted devices and then demanding money for ransomware removal. However, malware hunters have identified an anomaly with the new cryptovirological discovery. A new cryptovirological strain that goes with the name ‘CommonRansomware’ contains some unique demand in its ransom note. As per the preliminary investigation, the operators of this newly discovered ransomware are not just asking money to provide ransomware removal, but also directing the victims to provide them with their respective RDP credentials.

Experts are still trying to make sense of this outrageous demand by the operators of CommonRansomware. Why would anyone give away the credentials of their RDP for ransomware removal of a single device while putting the security of multiple devices in jeopardy?

The strain affixes the affected files with an extension that contains email ID of the attackers and the word ‘CommonRansomware’. Moreover, the operators give a very tight deadline of 12 hours to the victims to get in touch with them for ransomware removal.  They threaten to delete the decryption key after 12 hours to cause permanent loss of encrypted data.

In order to prove that they have the decryption key, CommonRansomware operators also offer free decryption of one text file of less than 10 MB in size. However, they make sure that the decrypted file does not contain any critical information.

Apart from RPD credentials, the attackers also want 0.1 Bitcoin for providing the decryption key. It has also been found out that the Bitcoin address provided in the ransom note has been used in many previous ransomware activities as well. Revealing RPD credentials to the criminals is a recipe for further cyber disaster. So, make sure you deal with the attack through professional help instead of paying heed to the attackers’ demand.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Kraken operators come up with a new exploit for RaaS activity Next post Australian Shipbuilder Attacked

Related Articles

A Close Look at Cybersecurity Trends in 2018

February 16, 2018Simeon Georgiev
A Close Look at Cybersecurity Trends in 2018

Two Percent of Amazon Buckets Open To All, Potentially Exposed to Ransom Attacks

March 1, 2018Simeon Georgiev
Two Percent of Amazon Buckets Open To All, Potentially Exposed to Ransom Attacks

GandCrab Ransomware Version 2 Released With New .Crab Extension & Other Changes

March 9, 2018Simeon Georgiev
For assistance with file recovery and ransomware removal, please contact MonsterCloud – cyber security experts for a professional ransomware removal.

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.