• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

SOLO ransomware – A Cryptovirological discovery

November 2, 2018Simeon Georgiev

With continuous progress in the domain of cryptovirology, ransomware operators are now trying new ways and methods to carry out successful exploits. For instance, many cryptovirological developers are focusing on certain geographical territories to carry out their shenanigans. One recent ransomware discovery has also identified a strain that might have been developed on the same lines i.e. to target users in a certain region or country. This cryptovirological strain goes by the name SOLO and devised to target German users. However, that doesn’t mean people in other parts of the world can’t get affected by SOLO ransomware. Like any cyber threat, every ransomware code is also a global hazard, and similar is the case for this strain. Like most of the cryptovirological strains, SOLO also uses AES encryption module to lock down the files on the affected device. And as the name suggests, the encrypted files are affixed with the extension ‘SOLO’.

Ransom note or a guide for buying Bitcoins?

It looks as if the operators of SOLO ransomware have formulated an entire Bitcoin purchase guide in the ransom note. They thoroughly guide the affected users regarding different avenues to buy Bitcoins for paying them extortion money for ransomware removal. They even suggest the targeted users to Google the phrase ‘buying Bitcoins’.

In addition, they make the extortion demand of 0.2 Bitcoins for providing decrypter for ransomware removal. This amount roughly converts to $1300 as per today’s exchange rates. SOLO operators also warn targeted users to abstain from attempting ransomware removal on their own because it can lead to permanent loss of the encrypted data.

Like HiddenBear, the operators of SOLO ransomware are also not providing sample decryption to prove that they have the complete solution to unlock all the affected data. Researchers are still trying to find the distribution method used by the attackers.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Crawford County Gets Hacked Next post HiddenBeer Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.