• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Cryptovirological Discovery: Rumba Ransomware

February 8, 2019Simeon Georgiev

Cryptovirological operators are diligently and continuously working on new ransomware strains. This is the reasons why ransomware removal experts and malware hunters come across a new strain or any variant every other day.

In the latest cryptovirological discovery, researchers have found out yet another variant of Stop ransomware. The name of the new Stop variant is Rumba, after the famous musical style and for no apparent reason.

According to the preliminary investigations into the nature of the strain, it has been found out that it used Advanced Encryption Module to lock down files on the targeted device. AES encryption has the ability to lock nearly every file format. However, the good news is most of the professional ransomware removal experts know how to crack it. Researchers have also found out that Rumba ransomware is mostly targeting European and Asian users.

Bogus Window Updates and Fake Cracked Software: The Payload Delivery Method of Rumba Operators

Ransomware operators mostly use phishing email with infected attachments to deliver the payload of malware. However, Rumba ransomware operators have used a less-taken route to deliver the malware payload. They have devised fake window updates and cracked versions of software applications and spread them across different unprotected web domains.

People who download these executable files actually download the cryptovirological script, which unpacks when users click on the downloaded executable file. To prevent ransomware or any other malware infiltration, it is recommended to only use official and authentic websites to download any software program or patch.

Rumba Operators Offer ‘Discount’ on Extortion Payment

Ransomware operators are aware of the fact that the majority of targeted users will not contact them to get the solution. Therefore, Rumba operators have modified their ransom offer. They offer free decryption of one file of up to 1MB to prove that they have the complete decryption solution.

Moreover, they also offer to waive 50% ransom amount if the user is willing to pay it within three days after the attack. Rumba operators are asking for 980$ in Bitcoin to provide complete ransomware removal and that can be reduced to $490 by making the payment within 72 hours.

Even paying $490 to cybercriminals is not worth it. First of all, there is no guarantee that you will get the complete solution to unlock all the encrypted data even after the payment of ransom. Secondly, the payment of ransom will encourage the operators to expand their shenanigans.

To deal with any malware attack such as ransomware that targets data, maintain a routine of making data backups. Moreover, in case of any cyber attack on your device or network, ask for professional help instead of engaging with the perpetrators of the attack.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ransomware Hits Servers of Del Rio City Hall, Texas Next post Kwik Fit Hit by Malware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.