Ransomware STOP started installing Trojans to steal victim passwords
In addition to encrypting files on the system, ransomware STOP strains have also started quietly installing the Azorult password stealing Trojan on the victim's computer to steal account information, electronic wallet, and file desktop .
The Azorult Trojan is a type of malicious code that, when spread to a victim's computer, tries to steal user name and password information stored in the browser, as well as files on the victim's system. , electronic wallet, Steam login information, browser history, Skype message history, and many other valuable data. This information is then uploaded to a remote server under the control of the attacker.
- Google has reported a zero-day vulnerability that has just appeared in Windows 7, Microsoft has not yet released a patch
When first presented with the DJVU variant of STOP ransomware, distributed by fake software vulnerabilities in January, security experts have noted that when malware is executed, it will be negative. silently download many other components, and they are used to perform various tasks on the victim's computer. These tasks include displaying a fake Windows Update screen, disabling Windows Defender, and blocking access to secure websites by adding items to Windows HOSTS files.
When ransomware researcher Michael Gillespie tested some of the recent variants of the malware, he found that the Any.Run installation indicates that one of the files downloaded by ransomware has generated traffic. Azorult malicious code access. Gillespie also revealed more to BleepingComputer that there are four different models that he found that show network traffic related to Azorult.
Experts at BleepingComputer then tried to download and install a sample of the STOP Promorad ransomware variant to see if Azorult was installed as Michael Gillespie said. And indeed, when ransomware spreads on the BleepingComputer system, it proceeded to download the files listed in the IOC below and encrypt the computer. In this specific variant, when the files are encrypted, it will append the .promorad extension to those files and create a ransom note named _readme.txt, as shown in the image below.
- There were 12,449 serious data breaches recorded in 2018, an increase of 424% compared to 2017
The Promorad ransomware variant model that researchers at BleepingComputer also automatically downloaded a file named 5.exe and silently executed it. When implemented, the program will generate identical network traffic with the communications of the command and control server known to the Azorult information stealing Trojan.
Furthermore, after scanning with VirusTotal, many security vendors have discovered essentially, this file is a password stealing Trojan.
After becoming a victim of this ransomware, determining whether your password and documents have been stolen is an important issue that users need to consider.
The victim has been infected with the STOP ransomware variant and should immediately change the password of any online account that is being used and saved on the system, with special attention being paid to the accounts stored in the program. Browser. In addition, Victims should also change passwords stored in software such as Skype, Steam, Telegram and FTP Client. The last thing to do is check all the files that are being stored on the Windows desktop to determine if your personal information is in the hands of the attacker.
- Supercomputers can completely detect cyber threats
In the past, ransomware STOP has not stopped "evolving" and became a popular malicious code with a variety of variants, and it is currently impossible to determine how long they have installed Azorult. Therefore, to ensure safety, all STOP victims should immediately take the above remedies.
The list of extensions of known ransomware STOP strains includes:
.blower
.djvu
.infowait
.promok
.promorad2
.promos
.promoz
.puma
.rumba
.ash
If you have any concerns or questions regarding this ransomware software, you can post your questions in the dedicated Help & Help page about BleepingComputer STOP ransomware related issues here. .
You should read it
- Forecast 2021: The world of security will be devastated by ransomware '
- List of the 3 most dangerous and scary Ransomware viruses
- How to handle the emergency WannaCry malicious code from the National Information Security Department
- Ransomware LockerGoga is making a big corporation miserable
- Strange ransomware detection only attacks the rich
- Mexico's largest oil and gas corporation has been attacked by ransomware, presenting a cyber security disaster
- Research: The golden time to prevent malicious code after the system is compromised
- Ryuk Ransomware has added 'selective' encryption capabilities.
May be interested
- Scary data breaches in China: Information about the 'fertility' of more than 1.8 million women leakeda recent breach of the leaked online unprotected database in the world's most populous country has revealed a list of 'creepy' information collected on more than 1.8 million women in this country.
- Application protection against DFA attacksdifferential fault analysis, also known as dfa, is an attack technique designed to recover cryptographic keys from the application ...
- Facebook with online payment feature on iOS and Android, is testingrecently, facebook has suddenly launched a new, very useful mobile payment feature that makes it easier and more convenient for users to shop and turn this world's largest social network into a commercial center. online.
- So frustrated with the learning situation, students hack the school's computer systemwell, once again we find that students with poor grades or frequent absenteeism are not necessarily ignorant or ill-advised, but perhaps simply because of 'boredom'.
- Intel has overcome serious vulnerabilities in graphics drivers for Windowsintel recently announced that it has successfully overcome 20 security vulnerabilities in intel graphics driver for windows.
- Counter-Strike 1.6 features new Zero-Day, allowing malicious servers to hack gamers' computersif you're a counter-strike player, be careful.