• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Kraken Cryptor 2.0.5 Ransomware

October 28, 2018Simeon Georgiev

Recently, security experts have been busy in battling a new and powerful ransomware. The ransomware has been discovered to be a new variant of Kraken Cryptor Ransomware. It is going by the name of Kraken Cryptor 2.0.5 Ransomware. The ransomware began surfacing in October 2018.

Identical to the original, the newer variant is a serious threat for businesses. The ransomware displays common characteristics of ransomware where it stealthily enters via distribution strategies like spam email campaigns and freeware. Some of the unique characteristics displayed by the ransomware include the following:

  • Employs the use of TOR network to secure its contents.
  • Adds a file titled “Instructions.txt” in the desktop, which serves as the ransom note.
  • Potent enough to apply encryption on all types of data formats and locks different files.
  • A .JLQUF extension is appended at the end of the hacked files, rendering them inaccessible.
  • Encryption is applied via a combination of AES and RSA— standard but extremely powerful cryptographic algorithms.
  • So far, the common attribute in these cases is Windows OS.

In the beginning of the ransom note from Kraken Cryptor 2.0.5 Ransomware, users are informed about the breach and locking of data by the mention of ransomware name. Afterward, they are forced to comply with ransomware removal. For successful ransomware removal, a decryption key is promised, which is named as “KRAKEN ENCRYPTED UNIQUE KEY”. In exchange for the key, which is promoted as the only tool to remove ransomware, a ransom demand of 0.075 BTC is mentioned.

Moreover, the attackers ask their victims to initiate communication with them as soon as possible via the given email. The initial deadline of the ransom payment is one week. Failure to comply with the demand leads to a bigger demand in the future. The letter ends with one last threat to pay the ransom.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Experts discover new Ransomware as a Service (RaaS) strain Next post iCloud Hacker Demanded $175,000 From Apple

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.