{"id":14419,"date":"2019-01-25T11:10:15","date_gmt":"2019-01-25T19:10:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/25\/news-8171\/"},"modified":"2019-01-25T11:10:15","modified_gmt":"2019-01-25T19:10:15","slug":"news-8171","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/01\/25\/news-8171\/","title":{"rendered":"Sly criminals package ransomware with malicious ransom note"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 25 Jan 2019 18:00:00 +0000<\/strong><\/p>\n<p>Ransomware continues to show signs of evolution. From a simple screen locker to a highly-sophisticated data locker, ransomware has now become a mainstream name, even if (historically), it has been around <a href=\"https:\/\/en.wikipedia.org\/wiki\/AIDS_(Trojan_horse)\" target=\"_blank\" rel=\"noopener\">far longer than we want to look back<\/a>.<\/p>\n<p>Although the criminals behind ransomware campaigns are observed to be refining their approaches\u2014from the \u201cspray and pray\u201d tactic to something akin to wide beam laser precision\u2014they are also fine-tuning their targets. They can single out organizations, companies, and industries; and they can also hold <a href=\"https:\/\/www.nytimes.com\/2018\/03\/27\/us\/cyberattack-atlanta-ransomware.html\" target=\"_blank\" rel=\"noopener\">cities<\/a> and <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/city-of-del-rio-hit-by-ransomware\/\" target=\"_blank\" rel=\"noopener\">towns<\/a> for ransom.<\/p>\n<p>Ransomware has also stepped up in sophistication. Criminals have begun introducing certain forms of hybridization in their attacks, either the ransomware file itself is given capabilities outside of its type (e.g., <a href=\"https:\/\/nakedsecurity.sophos.com\/2014\/12\/05\/notes-from-sophoslabs-ransomware-with-a-difference-this-one-is-a-true-virus\/\" target=\"_blank\" rel=\"noopener\">VirRansom<\/a> and <a href=\"https:\/\/blog.checkpoint.com\/2016\/06\/06\/zcrypt-the-ransomware-virus-hybrid\/\" target=\"_blank\" rel=\"noopener\">Zcrypt<\/a>\u00a0variants that can infect files) or the entire campaign involves one or more threat vectors.<\/p>\n<p>The latest in-the-wild ransomware strain <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1082990590617415680\" target=\"_blank\" rel=\"noopener\">discovered<\/a> by a group of security researchers known as <a href=\"https:\/\/twitter.com\/malwrhunterteam\" target=\"_blank\" rel=\"noopener\">MalwareHunterTeam<\/a> (MHT, for short) fits the latter.<\/p>\n<h3>Ransomware + phishing: a match made in heaven?<\/h3>\n<p>Nothing much is known about this ransomware\u2014which some are already dubbing as CryTekk\u2014apart from the way it applies a wily social engineering tactic to its ransom note, potentially to ensure a near 100 percent of affected parties acting on the infection and paying the ransom. The lure? An additional payment option for affected users who want to retrieve their files but don\u2019t have a cryptocurrency wallet.<\/p>\n<div id=\"attachment_26937\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26937\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/attachment\/dwd_ym8w0aerpmm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM.jpg\" data-orig-size=\"1200,1013\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Dwd_Ym8W0AErPMM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM-300x253.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM-600x507.jpg\" class=\"wp-image-26937 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM-600x507.jpg\" alt=\"\" width=\"600\" height=\"507\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM-600x507.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM-300x253.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Dwd_Ym8W0AErPMM.jpg 1200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">The ransom note. (Courtesy of MalwareHunterTeam)<\/p>\n<\/div>\n<p>Transcription:<\/p>\n<blockquote>\n<p><em>YOUR FILES HAVE BEEN ENCRYPTED!<\/em><\/p>\n<p><em>Dear victim:<\/em><\/p>\n<p><em>Files have been encrypted! And Your computer has been limited!<\/em><\/p>\n<p><em>To unlock your PC you must pay with one of the payment methods provided, we regularly check your activity of your screen and to see if you have paid. Paypal automatically sends us a notification once you\u2019ve paid, But if it doesn\u2019t unlock your PC upon payment contact us (CryTekk@protonmail.com)<\/em><\/p>\n<p><em>\u00a0Reference Number: CT-{redacted}<\/em><\/p>\n<p><em>When you pay via BTC, send us an email following your REF Number if your PC doesn\u2019t unencrypt. Once you pay, Your PC will de decrypted. However if you don\u2019t within 14 days we will continue to infect your PC and extract all your data and use it.<\/em><\/p>\n<p><em>Google \u2018how to buy\/pay with bitcoin\u2019 if you don\u2019t know how. To pay by bitcoin: send $40 to your unique bitcoin address.<\/em><\/p>\n<p><em>34ieoNtVEUpcWeVbuxUWXoyANEBBy22TUb<\/em><\/p>\n<\/blockquote>\n<p>Clicking the yellow \u201cBuy now\u201d button in the small PayPal option box opens a browser tab to direct users to a phishing page asking for card details:<\/p>\n<div id=\"attachment_26939\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26939\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/attachment\/dwekuqpx4aihsxu\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU.jpg\" data-orig-size=\"1200,982\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"DweKUqPX4AIHSXU\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU-300x246.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU-600x491.jpg\" class=\"wp-image-26939 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU-600x491.jpg\" alt=\"\" width=\"600\" height=\"491\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU-600x491.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU-300x246.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweKUqPX4AIHSXU.jpg 1200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">The first PayPal phishing page asking for card deets. (Courtesy of MalwareHunterTeam)<\/p>\n<\/div>\n<p>After supplying the information wanted and clicking the \u201cAgree and Confirm\u201d button, users are then directed to another phishing page asking for personal information, which they need to fill in to \u201cconfirm\u201d their identities:<\/p>\n<div id=\"attachment_26940\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26940\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/attachment\/dwemfhwxqaafqrd\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD.jpg\" data-orig-size=\"1200,1043\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"DweMFhWXQAAfqrD\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD-300x261.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD-600x522.jpg\" class=\"wp-image-26940 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD-600x522.jpg\" alt=\"\" width=\"600\" height=\"522\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD-600x522.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD-300x261.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/DweMFhWXQAAfqrD.jpg 1200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">The second PayPal phishing page asking for personally identifiable information (PII). (Courtesy of MalwareHunterTeam)<\/p>\n<\/div>\n<p>After filling in all information, clicking the \u201cAgree and Confirm\u201d button points users to a fake confirmation that the user\u2019s account access is fully restored, which is odd because, as far as the user knows, they were paying the ransom, not addressing a problem about their PayPal accounts. Now, if the user hadn\u2019t already realized that they had been duped twice, at this point they might.<\/p>\n<div id=\"attachment_26941\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26941\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/attachment\/success-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success.png\" data-orig-size=\"1072,881\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"success\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success-300x247.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success-600x493.png\" class=\"wp-image-26941 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success-600x493.png\" alt=\"\" width=\"600\" height=\"493\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success-600x493.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success-300x247.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/success.png 1072w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">The fake \u201cconfirmation\u201d page. (Courtesy of MalwareHunterTeam)<\/p>\n<\/div>\n<p>Finally, clicking the \u201cMy PayPal\u201d button directs users to the legitimate PayPal login page.<\/p>\n<h3>Fool me once, shame on me. Fool me twice\u2026<\/h3>\n<p>While ransomware is not as rampant today compared to two years ago, it remains a top threat to consumers and businesses alike. It wouldn&#8217;t surprise us at all if the real intent of the criminals behind this campaign is to bank on people\u2019s fear of ransomware to go after their money and credentials.<\/p>\n<p>Files encrypted by this ransomware can be decrypted, as <a href=\"https:\/\/twitter.com\/demonslay335\/status\/1083016956373098496\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> by MHT\u2019s own Michael Gillespie in a tweet. In fact, within two hours after the initial MHT tweet, Gillespie already offered to decrypt files for possible victims. This confirms what Bleeping Computer stated about the ransomware code being \u201cnothing special.\u201d This also suggests that the criminals put greater effort into the phishing side of the campaign than to the ransomware itself.<\/p>\n<p>Since most, if not all, ransomware attacks ask for cryptocurrency payment, this attack differentiates itself by offering victims an alternative pay first before presenting the Bitcoin payment option. This leads us to speculate that, although they didn\u2019t say it outright, PayPal is their preferred payment method. Also, $40 in Bitcoin in exchange for decrypting files? That\u2019s cheap compared to the amount criminals will be getting from victims once they access their accounts using the swiped credentials.<\/p>\n<p>Regardless of whether we see this as a sophisticated ransomware campaign or a \u201creally dope\u201d attempt at phishing, one thing is clear: They are after your money <em>and<\/em> credentials, so it pays to know <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener\">when you\u2019re being phished<\/a>.<\/p>\n<p>It can be frightening to find oneself face-to-face with a ransomware infection, but let us remain calm and keep our heads together. Remember that <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\" rel=\"noopener\">criminals want us to feel vulnerable<\/a>, so be and do the opposite. Scrutinize URLs carefully before you enter your credentials or PII. If you feel that something is amiss, follow your gut and don\u2019t proceed any further. If you think you\u2019re stuck and don\u2019t know what to do next, don\u2019t be afraid to ask for help from someone online or in-person who is savvy enough to guide you.<\/p>\n<p>Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/\">Sly criminals package ransomware with malicious ransom note<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 25 Jan 2019 18:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/' title='Sly criminals package ransomware with malicious ransom note'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/shutterstock_681333058.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Ransomware is not dead. It\u2019s changing\u2014and we need to be ready for them.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/crytekk\/\" rel=\"tag\">crytekk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crytekk-ransomware\/\" rel=\"tag\">crytekk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hybrid-ransomware\/\" rel=\"tag\">hybrid ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/paypal-phishing\/\" rel=\"tag\">paypal phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/' title='Sly criminals package ransomware with malicious ransom note'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/sly-criminals-package-ransomware-malicious-ransom-note\/\">Sly criminals package ransomware with malicious ransom note<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20780,20781,4503,20782,20783,3924,10510],"class_list":["post-14419","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-crytekk","tag-crytekk-ransomware","tag-cybercrime","tag-hybrid-ransomware","tag-paypal-phishing","tag-phishing","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14419"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14419\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}