News

December 19, 2016

Lots of small little updates with no big news from any major Ransomware distributions.

Of particular note is the fact that the Samas gang has made $450,000 from their operation, which may not be that big compared to some of the others, but has a much lower distribution as well. Another item to watch out for the holidays when people are buying presents is that Cerber is now sending spam pretending to be credit card purchase notifications.

Last, but not least, Emsisoft, Bitdefender, Check Point, and Trend Micro have been added as associated partners to the No More Ransom organization.

Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @fwosar, @demonslay335, @struppigel, @malwrhunterteam, @campuscodi, @PolarToffee, @DanielGallagher, @kafeine, @JAMESWT_MHT, @jiriatvirlab, @Seifreed, @nyxbone, @drProct0r, @proofpoint, and @msftmmpc.

If you are interested in ransomware or InfoSec, I suggest you follow all of them on Twitter.

Update 12/18/16: Removed LevisLocker, which is a "Joke Ransomware" used to mess with Tech Support Scammers.

December 10th 2016

CHIP Ransomware uses the Dale Extension for Encrypted Files.

In homage to the Chip & Dale Disney characters, Michael Gillespie discovered that the CHIP ransomware now uses the Dale extension for encrypted files. This ransomware uses This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it. as email addresses to contact for payment instructions.

Chipdale471

In-Dev Deadly_60 Screen Locker Discovered

I discovered a new screen locker with an incredibly annoying matrixesque background animation. Does not encrypt any files.

deadly 60 screenlocker

PadCrypt Ransomware 3.1.5 released

I found a sample of the PadCrypt Ransomware showing that it's version is now 3.1.5. Not much more to say on this one.

padcrypt 3 1 5

M4N1F3STO Virus Screen Locker Discovered

Jiri Kropac discovered a screen locker called M4N1F3STO Virus. The unlock code can be found here.

CzalNZSXcAEF5 d1

December 12th 2016

Samas Ransomware Group Made at Least $450,000

Microsoft Malware Protection Center released a report about how the criminal group being Samas has made at least $450,000 by infecting organizations with the Samas ransomware in the past year, according to an analysis by researchers from security firm Palo Alto Networks.
SAMSA                                                                         Samas Bitcoin profits over time [Source: Palo Alto]

PayDay Ransomware based on Hidden-Tear Discovered

I discovered the PayDay Ransomware, which is based off of Hidden-Tear. PayDay uses a background from the PayDay video game and is written in Portuguese. When it encrypts files it will append .sexy to encrypted files and creates ransom notes called !!!!!ATENÇÃO!!!!!.html.

ransom note

You Have Been Hacked!!! Ransomware

MalwareHunterTeam discovered a new in-dev ransomware titled You Have Been Hacked!!!. When it encrypts a file it will append the .Locked extension to the file. This ransomware will also attempt to steal passwords, which it will display when you click on the Full list of passwords button. Whether or not it actually will leak them is unknown.
CzeTWQ8WIAAN4Wy1

Kraken Ransomware Discovered

Michael Gillespie discovered a new ransomware called Kraken. This ransomware will rename encrypted files to [base64].kraken and create ransom notes called _HELP_YOUR_FILES.html.

CzfDPwLW8AAq26o1

December 13th 2016

New Screen locker called Windows Has Been Banned

Jiri Kropac discovered a new variant of a previously released screenlocker that is now titled Windows Has Been Banned. The unlock code is nvidiagpuareshit.

CzjXWOOXgAA3N8x1

CryptoMix updated to use New Extension

Malware researcher xXToffeeXx discovered a new variant of the CryptoMix ransomware that is using the .email[This email address is being protected from spambots. You need JavaScript enabled to view it.]id[\[[a-z0-9]{16}\]].lesli extension for encrypted files and creates ransom notes titled INSTRUCTION RESTORE FILE.TXT.

Locked-In Decryptor Released

Michael Gillespie released a decrypted for the Locked-In Ransomware. Information on downloading and using the decryptor can be found here.

December 14th 2016

Cerber Ransomware Spreads via Fake Credit Card Email Reports

Just in time for the Christmas holiday shopping spree, Microsoft Malware Protection Center has discovered that the group behind the Cerber ransomware has launched a spam campaign that uses fake credit card reports to trick users into opening a Word file that under certain circumstances will download and install the deadly Cerber ransomware.

Cerber annotated email

New Xorist Ransomware that uses the .antihacker2017 Extension
I found a new Xorist variant that appends .antihacker2017 to encrypted files. Emsisoft's decryptor will handle it.
CzqUU83WQAAAmWM1

New Globe variant that uses the This email address is being protected from spambots. You need JavaScript enabled to view it. Extension

Robert Rosenborg discovered a new Globe variant that uses the This email address is being protected from spambots. You need JavaScript enabled to view it. extension for encrypted files.

CzozOlhXAAAeal61

CIA Special Agent 767 Screen Locker Discovered

I discovered a new variant of the M4N1F3STO Virus, but now uses a different background. The unlock code can be found here.
Czp896TXgAA2zAW1

New variant of the FenixLocker Discovered

GData malware analyst Karsten Hahn has discovered a new variant of the FenixLocker Ransomware. This variant uses the ransom note Help to decrypt.txt and the email address This email address is being protected from spambots. You need JavaScript enabled to view it. for payment instructions.

New In-Dev Koolova Ransomware only Encrypts the Test Folder

xXToffeeXx discovered the in-dev Koolova ransomware with Italian text that only targets the Test folder on the user's desktop.

CzqVjDrWIAAiq3c1

December 15th 2016

No More Ransom Project Expands with 34 New Partners, 32 New Free Decryption Tools

Bitdefender, Check Point, Emsisoft and Trend Micro are now associated partners with NoMoreRansom, a title reserved for companies that directly contribute to the development of new unique decryption tools and decryption keys.

New BandarChor Ransomware Variant Spreads via Malvertising on Adult Sites

ProofPoint security researcher Kafeine has discovered that malicious ads displayed on several adult websites and a store selling quadrocopters (drones) are infecting visitors with a new version of the BandarChor ransomware.

Someone named Chris is playing with Hidden-Tear

Chris is playing with the Hidden-Tear Ransomware. Someone should tell his parents.

CzuhsgJWgAMEcXh1

New Cryptorium Ransomware Discovered

Karsten Hahn has discovered a new ransomware called Cryptorium. Cryptorium only renames files and does not encrypt them. Appends the .ENC extension to renamed files.

CzuyD3hWQAIyxOn1

December 16th 2016

Unknown Ransomware discovered that impersonates Globe

MalwareHunterTeam discovered an "Unknown ransomware" sample that impersonates Globe. Uses the ransom note HOW_OPEN_FILES.hta and appends the .crypt extension to encrypted files. Uses the email address This email address is being protected from spambots. You need JavaScript enabled to view it. for payment contact.

Czz10 CWgAAyI5A1

Cerber Ransomware using a new IP range for UDP Statistics

MalwareHunterTeam discovered that Cerber has changed the IP ranges used for UDP stats. It now uses the 37.15.20.0/27, 77.1.12.0/27, and 91.239.24.0/23 IP ranges..

New variant of the Globe Ransomware discovered using the Email Address This email address is being protected from spambots. You need JavaScript enabled to view it.

xXToffeeXx discovered another variant of Globe with a different note format and using the extension This email address is being protected from spambots. You need JavaScript enabled to view it..

Cz1LQwGXgAAj8Pb1
News Courtesy : 
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-16th-2016-samas-no-more-ransom-screen-lockers-and-more/