• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

A Politically-Motivated Locker Ransomware is Discovered

May 23, 2018Simeon Georgiev

In the last couple of years, hacktivism has become a recurring theme in cyberspace. It entails the pushing of any political or social agenda with the help of malevolent cyber activity. This hacktivism can vary according to the extent of malicious cyber activities. We have seen how hacktivists have partially damaged critical infrastructural installations through system hacking to convey their message.

Last week, a group of malware hunters discovered a new locker ransomware that might be the brainchild of some communist hacktivists. The cryptographic code has been named Stalinlocker, which locks down the screen of the affected device with a Portrait of Joseph Stalin while the anthem of USSR plays in the background.

Read Also: Are Ransomware Operators Choosing Quality Over Quantity?

Stalinlocker gives the victim 10 minutes to enter a code for ransomware removal. Otherwise, it starts deleting the files from alphabetically sorted drives.

Interesting Decryption of Stalinlocker

According to the team of researchers that discovered this locker ransomware on the web, the code for ransomware removal can be obtained by subtracting the date of the attack from the date when USSR came into being.  As soon as the correct code is entered, the autorun window of Stalinlocker terminates automatically.

Stalinlocker Affects Various Functions on the Affected Device

This lockers ransomware terminates all the running programs on the affected device except Skype. It installs an mp3 file of USSR anthem in the Local Folder in the User Profile and extracts it automatically. Furthermore, it terminates all the task manager operations on the affected device including explorer.exe. This means even if it doesn’t lock the screen, the user will remain unable to use the affected device.

No Ransom Demand

As of now, you can do ransomware removal by simply entering the derived unlock code. The operators of Stalinlocker haven’t made any ransom demand yet. This also proves that the attacks are politically-motivated. As it is known that many quarters are working for the renaissance of USSR and this hacktivism might be part of it.

Researchers also suggest that Stalinlocker is in its nascent phase and more features can be included in this locker ransomware to make its activity more lethal.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ransomware: An Equally Alarming Threat for Middle Eastern Businesses Next post Supply Chain: A New Business Target for Ransomware Operators

Related Articles

Ransomware 101: Locker Ransomware

May 21, 2018Simeon Georgiev
Ransomware 101: Locker Ransomware

Ransomware Strains Discovered During Last Week

May 23, 2018Simeon Georgiev
Ransomware Strains Discovered During Last Week

NSB Ransomware

August 2, 2018Simeon Georgiev
nsb ransomware

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.