• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Spartacus: A New Ransomware Strain Developed on Asymmetric Cryptography

April 18, 2018Simeon Georgiev

Cyber security researchers keep discovering new ransomware strains every other week. In this year alone, we have seen many different ransomware strains have surfaced on the cyber horizon. Lately, ransomware hunters have discovered a new cryptographic malware that ‘belongs to the ancient Greek city of Sparta’ as its operators have named it ‘Spartacus’.

According to cryptography experts who have read its code, Spartacus employs asymmetric cryptography to lock down the files on affected devices. It’s one of a kind cryptographic strain where the operators also want to send you the public key along with the email to remove ransomware. Like majority of ransomware operators, handlers of Spartacus also want ransom payments in Bitcoin.

Interestingly, every encrypted file lodged with the extension that also mentions the contact ID of the attackers. To guarantee that they can reinstate your device to its unaffected state, the perpetrators offer free ransomware decrypt of five encrypted files.

A ransom note is dropped at different locations in the device including desktop warning off the users to not rename the affected files and to not use any software for ransomware decrypt because it can result into permanent loss of data. Ironically, they also ask and ‘advise’ the affected user not to hire third party services to remove ransomware as it will only increase the price of restoring ransomware files.

Spartacus’s Operators are Expert

Spartacus can encrypt every file on the device regardless of its types and extension. Moreover, it deletes all the shadow volume copies so you can’t use a built-in backup system offered by Windows. It also runs a mutex to ensure that the cryptographic code doesn’t run for more than once. Spartacus’ ransom screen will continue to run in the foreground or on top of the screen as long as the device is on. It’s a psychological ploy used by the attackers to push the victim to pay them for ransomware decrypt.

According to experts, to remove ransomware without yielding to the demands of Spartacus’ operators, a key can be extracted from the memory if the cryptographic script is left running. However, experts haven’t tested ransomware decrypt of Spartacus by this method until now.

For assistance on file recovery from Spartacus ransomware, please contact MonsterCloud Cyber Security experts for a professional ransomware removal. 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Evolving Ransomware Attacks are Here to Stay, a Security Expert Concludes at ICRMC Next post Targeting Public Services: A Growing Trend in Ransomware Attacks

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.