{"id":25027,"date":"2024-08-06T03:10:08","date_gmt":"2024-08-06T11:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/08\/06\/news-18757\/"},"modified":"2024-08-06T03:10:08","modified_gmt":"2024-08-06T11:10:08","slug":"news-18757","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/08\/06\/news-18757\/","title":{"rendered":"Magniber ransomware targets home users"},"content":{"rendered":"\n<p>If you\u2019ve been following any <a href=\"https:\/\/www.threatdown.com\/blog\/ransomware-review-july-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">news about ransomware<\/a>, you may be under the impression that ransomware groups are only after organizations rather than individual people, and for the most part that\u2019s true.<\/p>\n<p>However, Magniber is one ransomware that does target home users. And it&#8217;s back, with full force, demanding four figure ransoms to unencrypt data.<\/p>\n<p>BleepingComputer, which has a dedicated forum for ransomware victims, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/surge-in-magniber-ransomware-attacks-impact-home-users-worldwide\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reports<\/a>:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cA massive Magniber ransomware campaign is underway, encrypting home users&#8217; devices worldwide and demanding thousand-dollar ransoms to receive a decryptor.\u201d<\/p>\n<\/blockquote>\n<p>This surge was confirmed by <a href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ID-Ransomware<\/a>, which helps users to identify the ransomware family that has infected their systems. ID-Ransomware has received well over 700 requests from visitors who had their files encrypted by Magniber since July 20, 2024. Malwarebytes&#8217; telemetry also shows an uptick in Magniber detections in July.<\/p>\n<p>Magniber <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2017\/10\/magniber-ransomware-exclusively-for-south-koreans\">first emerged<\/a> in 2017 when it 2024 targeted South Korean systems. In 2018, it <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2018\/07\/magniber-ransomware-improves-expands-within-asia\">started infecting computers<\/a> with a much more developed version which also targeted other Asian countries like Malaysia, Taiwan, and Hong Kong.<\/p>\n<p>The new campaign does not limit itself to specific regions and uses tried and trusted methods to reach home users\u2019 systems. The ransomware is often disguised in downloads for cracks or key generators of popular software, as well as fake updates for Windows or browsers. In some cases, the group takes advantage of unpatched Windows vulnerabilities.<\/p>\n<p>When infected, victims are presented with this ransom notice:<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"865\" height=\"615\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/08\/Magniber-ransom-note.png\" alt=\"Magniber ransom note\" class=\"wp-image-114927\" style=\"width:862px;height:auto\" \/><\/figure>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Your important files have been encrypted due to the suspicion of the illegal content download!<\/p>\n<p>Your files are not damaged! Your files are modified only. This modification is reversible.<\/p>\n<p>Any attempts to restore your files with the third party software will be fatal to your files!<\/p>\n<p>To receive the private key and decryption program follow the instructions below:<\/p>\n<\/blockquote>\n<p>The instructions will tell you to visit a website which can only be reached by using the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/08\/what-is-tor\">Tor browser<\/a>.<\/p>\n<p>Once the ransomware has encrypted the targeted files, it will typically request a ransom in the region of $1,000 which is raised to around $5,000 if the victim does not pay within three days. Unfortunately, old decryptors that were available for free don\u2019t work for this version.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-home-users-can-prevent-ransomware\">How home users can prevent ransomware<\/h2>\n<p>There are some rules that can help you avoid falling victim to this type of ransomware:<\/p>\n<ul>\n<li>Make sure your system and software are on the latest version. Criminals will exploit known holes that have been patched by the vendors but not updated everywhere.<\/li>\n<li>Run a <a href=\"https:\/\/www.malwarebytes.com\/premium\">trusted anti-malware solution<\/a>.<\/li>\n<li>Never download illegal software, cracks, and key generators.<\/li>\n<li>Use a <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">malicious content blocker<\/a> to stop your browser from visiting bad sites.<\/li>\n<li>Don&#8217;t open unexpected email attachments.<\/li>\n<li>Don&#8217;t click on links before checking where they will take you.<\/li>\n<\/ul>\n<p>If you do accidentally get caught by ransomware, we recommend you don&#8217;t pay. There&#8217;s no guarantee you&#8217;ll get your files back, and you&#8217;ll be helping to line the pockets of criminals.<\/p>\n<p>Malwarebytes Artificial Intelligence module blocks the latest Magniber versions as Malware.AI.{ID-nr}. Older versions will be detected as Ransom.Magniber or Ransom.Magniber.Generic.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/magniber-ransomware-targets-home-users\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Home users are being targeted by a ransomware called Magniber which locks up files and demands money for the key. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[31748,15922,32,3765],"class_list":["post-25027","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-id-ransomware","tag-magniber","tag-news","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25027"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25027\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}