Ransomware Warning: two dangerous ransomware are back- save your system!

    0
    1514

    In just past few months, we saw a scary strain of ransomware attacks including WannaCryPetya and LeakerLocker, which made chaos worldwide by shutting down hospitals, vehicle manufacturing, telecommunications, banks and many businesses.

    Before WannaCry and Petya, the infamous Mamba full-disk-encrypting ransomware and the Locky ransomware had made chaos across the world last year, and the bad news is—they are back with their new and more damaging variants than ever before.

    Background of Ransomware:

    First surfaced in early 2016, Locky has been one of the largest distributed ransomware infections, infecting organisations across the globe.

    By tricking victims into clicking on a malicious attachment, Locky ransomware encrypts nearly all file formats on a victim’s computer and network and unlocks them until the ransom in Bitcoins is paid to attackers.The ransomware has made many comebacks with its variants being distributed through Necurs botnet and Dridex botnet.

    Diablo6: New Variant of Locky Ransomware

    security researchers have discovered a fresh spam malware campaign distributing a new variant of Locky known as Diablo6 and targeting computers around the world, with the United States being the most targeted country, followed by Austria.An independent security researcher using online alias Racco42 first spotted the new Locky variant that encrypts files on infected computers and appends the .diablo6 file extension

    How Does it Infect Computers?

    Like usually, the ransomware variant comes in an email containing a Microsoft Word file as an attachment, which when opened, a VBS Downloader script is executed that then attempts to download the Locky Diablo6 payload from a remote file server.

    The ransomware then encrypts the files using RSA-2048 key (AES CBC 256-bit encryption algorithm) on the infected computer before displaying a message that instructs victims to download and install Tor browser; and visit the attacker’s site for further instructions and payments.

    This Locky Diablo6 variant demands a sum of 0.49 Bitcoin (over $2,079) from victims to get their files back.

    Unfortunately, at this time it is impossible to recover the files encrypted by the .Diablo6 extension, so users need to exercise caution while opening email attachments.

    Return of  Mamba Ransomware

    Mamba is another powerful and dangerous kind of ransomware infection. that encrypts the entire hard disk on an affected computer instead of just files, leaving the system totally unusable unless a ransom is paid..

    Mamba Utilizing DiskCryptor:

    Now, security researchers at Kaspersky Lab have spotted a new campaign distributing Mamba infections, targeting corporate networks in countries, majorly in Brazil and Saudi Arabia.Mamba is utilizing a legitimate open source Windows disk encryption utility, called DiskCryptor, to fully lock up hard drives of computers in targeted organizations. So, there is no way to decrypt data as the encryption algorithms used by DiskCryptor are very strong.

     Researchers believe like most ransomware variants, Mamba might be using either an exploit kit on compromised or malicious sites or malicious attachments sent via an email.

    The ransom note does not immediately demand money, rather the message displayed on the infected screen only claims that the victim’s hard drive has been encrypted and offers two email addresses and a unique ID number to recover the key.

    Here’s How to Protect Yourself From Ransomware Attacks

    Currently, there is no decryptor available to decrypt data locked by Mamba and Locky as well, so users are strongly advised to follow prevention measures in order to protect themselves.

    Beware of Phishing emails: Always be suspicious of uninvited documents sent over an email and never click on links inside those documents unless verifying the source.

    Backup Regularly: To always have a tight grip on all your important files and documents, keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC.

    Keep your Antivirus software and system Up-to-date: Always keep your antivirus software and systems updated to protect against latest threats.