August 3rd 2019 | xxxAugust 3rd 2019 – xxx
菜单

August 3rd 2019

八月 9, 2019 - BleepingComputer

August 3rd 2019

As we creep towards the end of the summer, things have started to thankfully slow down a bit.

While there are still plenty of ransomware attacks going around, the amount we had seen last month against schools, companies, and government agencies has definitely decreased.

The biggest news was a wiper called GermanWiper targeting Germany and pretending to be a ransomware. Otherwise, for this week we mostly saw new variants of existing ransomware being released.

Contributors and those who provided new ransomware information and stories this week include: @DanielGallagher, @malwareforme, @struppigel, @BleepinComputer, @demonslay335, @Seifreed, @FourOctets, @LawrenceAbrams, @malwrhunterteam, @fwosar, @PolarToffee, @thyrex2002, @cybereason, @leotpsc, @Accenture, @JakubKroustek, @adrian__luca, @tkanalyst, @jeromesegura, @Malwarebytes, @Jan0fficial, @emsisoft, @virusbay_io, @VK_Intel, @James_inthe_box, and @raby_mr.

August 3rd 2019

New Q1G Dharma variant

Jakub Kroustek found a new variant of the Dharma ransomware that appends the .Q1G extension to encrypted file names.

August 4th 2019

GermanWiper Ransomware Erases Data, Still Asks for Ransom

Multiple German companies were off to a rough start last week when a phishing campaign pushing a data-wiping malware targeted them and asked for a ransom. This wiper is being named GermanWiper due to its targeting of German victims and it being a destructive wiper rather than a ransomware.

August 5th 2019

ECh0raix Ransomware Decryptor Restores QNAP Files For Free

A decryptor for the eCh0raix Ransomware, or QNAPCrypt,  has been released that allows victims to recover encrypted files on their QNAP NAS devices.

August 3rd 2019

New Paradise Team Ransomware

Alex Svirid found the new Cryakl variant calling itself Paradise Team and appending the .junior extension to encrypted files.

New version of MegaCortex targets business disruption

iDefense engineers have identified and analyzed a recently updated version of the dangerous ransomware MegaCortex, which is known to have previously caused costly incidents across various industries in Europe and North America.

SODINOKIBI: THE CROWN PRINCE OF RANSOMWARE

In April of 2019, the Cybereason Nocturnus team encountered and analyzed a new type of ransomware dubbed Sodinokibi. Sobinokibi is highly evasive, and takes many measures to prevent its detection by antivirus and other means.

New OPdailyallowance Ransomware

Leo found a new ransomware called OPdailyallowance that tries to combine Cryptowall and FSociety into one ransomware. Doesn’t encrypt anything.

August 3rd 2019

New STOP DJvu variants

Michael Gillespie found two new STOP DJvu variants that append the .zatrov or .prandel extensions to encrypted file names.

August 6th 2019

New Lord Exploit Kit Pushes njRAT and ERIS Ransomware

A new kit for web-based attacks calling itself Lord EK has been spotted at the beginning of the month as part of a malvertising chain that uses the PopCash ad network.

New Brusaf STOP DJvu variant

Michael Gillespie found a new STOP DJvu variant that appends the .brusaf extension to encrypted file names.

STOP Djvu Decryptor updated

Michael Gillespie updated his STOP Djvu decryptor to support the offline keys for the .nelasod, .mogranos, .lotej, .prandel, .zatrov, .masok extensions.

Arsium Ransomware Builder released

Jan discovered the new Arsium Ransomware Builder being prompted on malware forums.

August 3rd 2019

August 7th 2019

New MegaCortex variant

Vitali Kremez found a new variant of the MegaCortex Ransomware that users the MEGA-G6= marker.

New Help Phobos Ransomware variant

Raby found a new variant of the Phobos Ransomware that appends the .help extension to encrypted file names.

August 8th 2019

US Accounts for More than Half of World’s Ransomware Attacks

The threat of ransomware is more prevalent in the U.S., with more than half of the global detections originating from this country, a new report informs

August 3rd 2019

Emsisoft Decryptor for JSWorm 4.0

JSWorm 4.0 is a ransomware written in C++ that uses a modified version of AES-256 to encrypt files, and adds the extension “.[ID-][].JSWRM to files.

How Reverse Engineering (and Cyber-Criminals’ Mistakes) Can Help You When You’ve Been a Ransomware Victim

Luckily for us, ransomware developers are not always as professional as they wish and sometimes, they make mistakes that allow us to recover the kidnapped files without having to pay the ransom. That’s exactly what happened with a ransomware called Whiterose.

New Londec STOP DJvu variant

Michael Gillespie found a new STOP DJvu variant that appends the .londec extension to encrypted file names.

New SkidPatrol Ransomware

MalwareHunterTeam found a new ransomware called SkidPatrol.

That’s it for this week! Hope everyone has a nice weekend!

Related Articles:

The Week in Ransomware – July 26th 2019 – State of Emergency

The Week in Ransomware – June 14th 2019 – pyLocky and GandCrab Cleans Up

The Week in Ransomware – August 2nd 2019 – More of the Same

The Week in Ransomware – July 19th 2019 – Targeted Attacks

The Week in Ransomware – July 12th 2019 – Under Siege

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51