• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Ransomware Disguised as Windows Activator

August 31, 2018Simeon Georgiev

Recently, ransomware removal experts found a new strategy to spread ransomware. The newly-discovered ransomware poses as the Windows Activator. This ransomware propagates with the help of network drives. According to ransomware removal experts, the ransomware consists of a configuration function that is not visible. This configuration function exploits the victim’s PC and scans the disk so it can further engage in the encryption process.

While investigating this new development, ransomware removal experts found CryptoPP was found as the library that was utilized in the ransomware’s development. The open source library helps the ransomware to encrypt the initial 0x500000 bytes of data files in the compromised PCs. Afterwards, the cryptographic algorithm Advanced Encryption Standard starts to completely encrypt the files.

Subsequently, the ransomware will add an extension to all the affected files by adding ‘keypass’ at the end of the file names. A ransom note will also be provided. The ransom note demands a payment of $300 with a deadline limit of 3 days. Compliance with the payment is promised with the decryption of the affected files.

Ransomware removal experts have stated that the cyber pandemic of ransomware spreading across the world has become a great business model for cybercriminals. For this purpose, cybercriminals use cyber threats like worms and trojans to successfully infect victims’ PC. Now, these cybercriminals have come up with the novel idea of spreading their ransomware in the guise of a fake Windows Activator.

Alarmingly, last year several company servers were found to be attacked. It was estimated that almost 15 percent of the ransomware attacks were intended for SMEs (Small and Medium Enterprises). SMEs are seen as lucrative targets for ransomware attacks because their corporate and business data is expected to be more sensitive and less secure. Hence, maximum ransom money can be generated through the exploitation of such businesses.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Coweta County Thwarted Malware Attack with Regular Backups Next post Ransomware Attacks Cloquet School District Again

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.