New ransomware detection not only encrypts files but also helps 'clean up' the system
Rxomware vxCrypter is probably the first ransomware in the world that not only encrypts the victim's data but also helps clean up their computers by deleting duplicate files on the system.
Last week, security researchers at BleepingComputer discovered a new ransomware called vxCrypter is currently being developed and spread globally. This is a ransomware .NET and is based on an old ransomware that has never been distributed, called vxLock.
The list of nearly 600 MAC addresses was targeted in the recent hacking of millions of ASUS computer users
When first experimenting with this ransomware software, the researchers found that in addition to encrypting system data like the usual way that extortion codes often do, it also deletes all files. duplicate in the directory and leave only one file, as illustrated in the images below. According to experts, it is likely that this is just an error in the encryption process because as mentioned, this ransomware software is still in the development stage, so if something goes wrong It is understandable.
- The alarming increase in the number of attacks targeted at IoT devices
After conducting some necessary tests, security researcher Michael Gillespie said that deleting the file is intentional because ransomware is actually deleting duplicate files and not deleting them. Moreover, this is also the first ransomware software in the world to be recorded with this strange behavior.
When analyzing ransomware, Michael Gillespie noticed that it would track the SHA256 hash functions of each encrypted file. Because ransomware has encrypted many different files on the system, so if it encounters the same SHA256 hash function (duplicate), it will delete the file immediately instead of decoding.
- Endpoint Detection and Response threats, an emerging security technology
It should be noted, however, that this ransomware only deletes duplicate files that have tail extensions that were originally targeted for encryption, including:
.txt, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .sqlite, .odt, .jpg, .jpeg, .bmp, .gif, .png, .csv, .sql, .mdb , .sln, .php, .asp, .aspx, .html, .xml, .psd, .xsd, .cpp, .c, .h, .hpp, .htm, .py, .reg, .rb,. pl, .zip, .rar, .tgz, .key, .jsp, .db, .sqlite3, .sqlitedb, .bat, .bak, .7z, .avi, .fla, .flv, .java, .mpeg, .pem, .wmv, .tar, .tgz, .tiff, .tif
For files in a format other than the above list, such as .exe or .dll, the duplicate file will still be preserved.
Now researchers have not been able to confirm exactly why ransomware vxCrypter does this, the most reasonable assumption now is that deleting duplicate files is one way to help malicious code speed up the data encryption. system. Besides, vxCrypter's behavior is also a warning that we must be really wary in the context that attackers continue to develop malware that contains many different behaviors to increase performance. causing damage to malicious code.
You should read it
- Lukitus Guide to preventing extortion malicious code
- ShieldFS can stop and reverse the effects of extortion code
- Ryuk Ransomware has added 'selective' encryption capabilities.
- Discovered new ransomware on Mac computers
- GandCrab blackmail extinguished after earning $ 2.5 billion worldwide
- Ako ransomware is raging all over the world, what do you know about this ransomware?
- List of the 3 most dangerous and scary Ransomware viruses
- Ransomware can encrypt cloud data
May be interested
- [Infographic] 4 types of Phishing are easy to trap usersphishing often appears as a reliable activity by legitimate companies or a reputable electronic information site like ebay, paypal, gmail ..
- Insider attacks are becoming more and more popular and difficult to detectinternal attacks are becoming more and more popular in recent years.
- Hackers antivirus application preinstalled on Xiaomi phones into malwarewhat's more tragic when the tools that are considered shields for your device can now turn into malware that paves the way for unauthorized infringement, through the 'variable hand? virtual 'hackers'.
- [Infographic] 7 effective ways to protect businesses from Ransomwarehow to protect your business from ransomware? join tipsmake.com to follow the article to find the answer.
- Reveal personal data of more than 1.3 million people from a vulnerability in web applicationgeorgia tech (georgia institute of technology) - one of the largest us education institutions, has announced the discovery of a serious data breach targeting its system, affecting nearly 1.3 million people.
- Detect spyware targeting iOS usersnetwork security researchers have recently discovered the ios version of a phone spy application, originally designed to target android devices through applications on google play store.