The owner of extortionist Lockey is a big fan of Game of Thrones
According to what researchers at PhishMe recently discovered, the hacker group behind malicious code Locky is a fan of HBO's hit series, so much so that they include script names of movie characters and lots of information. other.
The researchers found this information in Visual Basic scripts, part of a ZIP or RAR file attached to a spam email. When the user opens the mail, download the file and run this script, the file will download and install Locky.
Names related to Game of Thrones can be found in VB scripts such as Aria, SansaStark, RobertBaration, JohnSnow and HoldTheDoor (or Hodor). The word Throne is also used 70 times.
Many names related to Game of Throne can be found in the script of malicious code
The runtime environment of this script does not matter how variable names are. The variable name would be fine, although it was a random combination of letters and numbers, 'said researcher Victor Cornell at PhishMe. 'The people behind this malicious code choose their own themes for their variables, thus revealing their interests'.
According to an independent researcher at MalwareHunter, this scenario has been exploited for several weeks. Below is IOC information.
File name: SCNMSG00001018.vbs
MD5: 170ae05fb405e9f2b2a4474739b75a66
SHA256: fc89d30e245a8b166af2e17b2d7b6835ff15999d746b91214edcfdc7b9c5db35
You should read it
- How to get rid of root virus * .OSIRIS - Ransomware Locky?
- Is Ransomware Annabelle scary with Annabelle movies?
- How to handle the emergency WannaCry malicious code from the National Information Security Department
- Disable malicious HiddenTear Ransomware with HT Brute Forcer
- Shade ransomware, the nightmare of 5 years ago is showing signs of returning
- List of the 3 most dangerous and scary Ransomware viruses
- GIBON extortion code spread through spam
- Warning: Dangerous new malicious code spills over to Vietnam
May be interested
- Even Bill Gates doesn't understand the algorithm behind quantum computingmicrosoft is betting a lot on quantum computing - the most modern technology area today to build a computer system more powerful than anything we've ever had before.
- Discover famous Android keyboard apps to collect user datago keyboard is a prominent and extremely popular keyboard application on android operating system, available on the google play store store has been discovered to collect user data, download and run code from the server of third-party.
- Google Maps displays user generated videos on the mapyour destination will be more alive than ever when searching with google maps.
- The latest version of Windows Server beta contains Linux Container supportit seems that microsoft and linux are slowly moving from enemy positions to infrastructure allies. in a windows blog post on wednesday, microsoft revealed that the windows server 1709 beta will support linux containers (virtualization technology lxc).
- China's three largest Bitcoin trading points are about to closeright after announcing the closure of one of the largest bitcoin trading points today, it is widely reported that two other major cryptocurrency exchanges are also about to end operations next month.
- Vevo music video service is hacked to leak large amounts of internal datathe hacker group ourmine again appeared and this time they attacked the popular music video service vevo revealed a large amount of its data.