• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Sicck Ransomware

November 21, 2018Simeon Georgiev

The first week of November, 2018 saw a new cyberthreat on the block. The threat has been identified as a ransomware which goes by the name of Sicck Ransomware. What’s more interesting is that it seems to be associated with RaaS or ransomware as a service. RaaS is the latest cybercriminal strategy where cybercriminals purchase a ransomware from another group of cybercriminals in the underground cybercriminal forums.

Similar to other standard ransomware Sicck Ransomware stealthily enters PCs of its victims and begins its machinations to make them inaccessible. Security experts who have been involved in its ransomware removal process claim that it can infect any Windows Operating system including XP, Vista, 7,8,8.1, and even the latest 10! Likewise, for users who use internet irresponsibly, it is important to realize that the ransomware can easily infect mainstream web browsers like Mozilla Firefox, Google Chrome, Internet Explorer etc.

The ransomware has been known to make use of several encryption mechanisms. Many of these mechanisms are open-source .i.e. their code is available online. These types of codes are made available to educate cybersecurity students and professionals to for educational purposes. Unfortunately, sometimes, cybercriminals (like in this case) make a mockery of such initiatives.

Security professionals discovered two major encryption mechanisms during ransomware removal: RSA 2048 bit and AES 256 bit. The ransomware is deemed perilous because it carries the tools to disable ransomware removal tools and firewalls. Afterward, it modifies the settings of the system. As a result, the performance of the PC is heavily affected.

In the end, it starts the encryption process. All types of user files including multimedia, text files, IT files are encrypted by the ransomware. These files have a unique extension at the end of their filenames which represents their locked state. Generally, the extension follows this format: [developer’s_email]original_filename.sicck

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Hospitals Are At Risk Next post Maria Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.