• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Shrug Ransomware: A New Threat

July 27, 2018Simeon Georgiev

Ransomware removal experts have found a new threat in the security space, Shrug Ransomware. The ransomware is deemed perilous because it employs the strategy of drive-by attacks.

A drive-by attack is a cyber attack in which hackers corrupt a website with malicious code. Those who visit it are then infected with Shrug Ransomware. According to ransomware removal experts, this is dangerous because unlike other ransomware where victims have to download an attachment or click a harmful link. In this case, netizens can be infected while surfing any website in the vast world of the Internet.

Shrug Ransomware was first noticed in the first week of July by ransomware removal experts as they discovered its presence in many hoax apps and games that have been distributed on the Internet as well as on mobile application stores. Files of victims are locked with an extension of .shrug. After the infiltration of the ransomware as well as successful encryption of the files, users are demoralized with a ransom note.

Analysis of the Ransom Note

Ransomware removal experts found the ransom note with a tone that consistently taunts victims. The ransom note acknowledges the presence of a ransomware in the victims’ PC and demands a ransom in the form of Bitcoin worth $50 for the return of access of the locked files. The attacker refers to themselves as “Martha”.

Since many users do not have the idea and knowledge regarding cryptocurrencies and Bitcoin, therefore many ransom notes consist of concise and thorough details regarding the purchase and transfer of funds. Hence, Shrug’s ransom note also provides instructions on how to purchase Bitcoin and transfer crypto funds to the hackers’ wallets. Like other ransom note, Shrug also contains a threat about the deletion of the locked files if the victim fails to comply with their demands.

 

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post FBI’s Stance on Ransomware Threat Next post Report on the Ransomware Removal Dilemma in Hospitals

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.