When it seemed that ransomware authors hit the lowest of the low with their attacks a long time ago, they managed to take it a notch further last month. With the revamped Petya Trojan that surfaced on June 27, the crooks broke new ground and started waging a real cyber war against a particular country. This toxic code renders computers inoperable, and paying the ransom does absolutely nothing.The quantitative summary for June is as follows: 66 new ransomware samples appeared, and 23 offshoots of known strains were discovered. To their credit, security vendors and enthusiasts released five free decryptors to help victims get their data back. Peruse this chronicle to get the big picture.JUNE 1, 2017BlueHowl screen locker spottedThis new ransom Trojan claims to encrypt files, but its impact is restricted to locking the screen of a target computer. It demands 0.2 Bitcoin and provides a payment deadline of 72 hours. The warning screen contains a QR code to streamline the payment process.Amnesia decryptor updateSecurity vendor Emsisoft enhances its free decryptor for the Amnesia ransomware. The updated version of this tool supports Amnesia2, the second generation of said strain.JUNE 2, 2017Hadoop hijacking saga moves onAccording to the latest reports, the number of ransomed Hadoop servers worldwide is currently on the order of 500. This may be partially the aftermath of attacks against these databases as of January this year, whereas some are quite likely still being targeted at the time of this writing.German ransomware called CainXPiiCainXPii appears to be a screen-locking counterpart of the Hitler ransomware, which surfaced in August 2016. While the Trojan in question does not apply any cipher, it erases some files every time a victim tries to terminate its executable. The pest asks for €20 in PaySafeCard.Joksy, another low-level threatSecurity researchers come across one more screen locker dubbed Joksy. Its warning message is in Lithuanian. The small ransom of $0.01 is payable in PayPal.LockCrypt ransomwareThis one blemishes hostage files with an extension in the following format: ID[unique victim identifier].lock. It also sprinkles ransom notes called ReadMe.txt all over the contaminated computer.JUNE 3, 2017Ramsey ransomware targeting Turkish usersThe sample dubbed Ramsey is a spinoff of the ubiquitous Jigsaw strain that concatenates the .ram string to encrypted files. Its ransom how-to is in Turkish. Victims are instructed to submit $25 worth of Bitcoin for data recovery.JUNE 4, 2017PoC based Executioner ransomwareThe new Turkish crypto hoax referred to as Executioner is one of the numerous derivatives of the educational open-source Hidden Tear code. It uses random extensions for locked files, generates a decryption walkthrough called Sifre_Coz_Talimat.html, and requests a Bitcoin equivalent of $150.Run-of-the-mill Mora Project strainMora Project is yet another offspring of the controversial Hidden Tear proof-of-concept. It affixes the .encrypted extension to scrambled files and leaves a ransom how-to document named ReadMe_Important.txt.StrutterGear pushes the Jigsaw terror forwardThe Jigsaw ransomware version known as StrutterGear features a new creepy background for its ransom note, which contains quite a bit of bad language. It demands $500 worth of Bitcoin.JUNE 5, 2017New facts on Jaff ransomware uncoveredSecurity analysts discover that the architects of the Jaff ransomware campaign are in cahoots with proprietors of a Russian cybercrime marketplace called PaySell. Specifically, the extortion operation relies on server space shared with said underground portal. Other infections affiliated with PaySell include Locky, Dridex, and the Necurs botnet.Jigsaw lineage more prolific than everThe payload of the fresh Jigsaw ransomware spinoff is disguised as Flash update. The infection uses the .lost extension to label encoded data.MrLocker isn’t as formidable as it appearsNew self-proclaimed ransomware dubbed MrLocker claims to wipe a victim’s personal data unless they submit $250 worth of Bitcoin within 10 days. Fortunately, these threats are nothing but a bluff.Jigsaw decryptor now boasts broader coverageMichael Gillespie (@demonslay335), the creator of ID Ransomware service, updates his previously released decryption tool for the Jigsaw family of crypto threats. The decryptor additionally supports variants that append the .ram, .lost, and .tax extensions to hostage files.Jigsaw knockoff called The Dark EncryptorThis one displays a ransom alert paying homage to the Jigsaw movie, although its ties with the infamous ransomware family have not been vetted. The Dark Encryptor uses the .tdelf string to label encoded data and demands $100 worth of Bitcoin.Ogre ransomware – nothing out of the ordinaryThe strain under consideration subjoins the .ogre extension to locked files and displays a somewhat primitive warning screen. Victims are instructed to cough up €20 in Bitcoin.Ransomware claiming to be YouTube-borneA tricky screen locker starts circulating in the wild. Its warning screen says, “You have violated the YouTube law,” whatever that means. Researchers were able to get hold of the unlock code, which is ‘law725’.$ucyLocker, an umpteenth HT offspringThe sample called $ucyLocker is based on open-source Hidden Tear PoC. It creates a help file named READ_IT.txt and concatenates the .WINDOWS extension to encoded entries.JUNE 6, 2017BTCWare tweakA new edition of the BTCWare ransom Trojan switches to appending the .[[email protected]].blocking suffix to scrambled files.CryMore sample being cooked upAnalysts spot in-dev ransomware that stains hostage data with the .encrypt extension. The size of the ransom is currently unknown, but the warning screen states that it will be getting 1.5 times bigger every 12 hours.CryptoSearch utility now supports more strainsA brand-new version of CryptoSearch is released. It is a tool that finds files locked by ransomware and allows victims to move them to a separate location for decryption in the future if an ad hoc free decryptor appears. Owing to the update, this app can identify data entries held hostage by the following ransomware: Amnesia, Amnesia2, Cry128, Cry36, and Cry9.One more sample identifiable with ID RansomwareThe ID Ransomware online portal has been updated to support the Cry36 crypto infection, which uses the [email protected] email address to interact with victims.The onset of Zilla ransomwareZilla is one of the increasingly widespread Turkish strains at large. It adds the .zilla string to every encoded file and leaves a decryption walkthrough called OkuBeni.txt, which translates as “ReadMe.txt”.JUNE 7, 2017BeethoveN ransomware, a new one on the tableThis one displays a ransom note stating that it leverages a combo of AES-256 and RSA-2048 ciphers to lock down a victim’s data. It concatenates the .BeethoveN extension to hostage files and provides a payment deadline of 168 hours.New MrLocker editionA successor of the buggy MrLocker ransomware surfaces. As opposed to its prototype, this one only locks the screen without threatening to delete data. Thanks to researchers who reverse-engineered the infection, victims can use the code ‘6269521’ to get around the lock screen.Jigsaw army gets a new trooperThe new iteration of the Jigsaw ransomware uses the .R3K7M9 extension to label inaccessible files. The above-mentioned free decryptor by Michael Gillespie can easily handle this derivative.JUNE 8, 2017Windows 10 Creators Update featuring anti-ransomware enhancementsAccording to Microsoft, the latest version of Windows 10 operating system boasts efficient mechanisms that help thwart ransomware attacks. To prove this, company executives emphasize that the recent WannaCry campaign has not affected a single Windows 10 user through its well-trodden path engaging NSA exploits.xXLecXx Trojan isn’t an issue at allSaid ransomware is a primitive screen locker that dupes people into thinking their data is encrypted. Victims can use Alt+F4 keys combo to close the lock screen – as simple as that.New strain targeting Russian usersAll the warning messages and instructions generated by the ransomware in question are in Russian. It affixes the .cr020801 string to locked files and tells victims to shoot a message to [email protected] for buyout steps.CryptoGod malady pops upAs per analysts’ verdicts, the sample called CryptoGod is a spinoff of the MoWare H.F.D. ransomware, which has been around since late May. The newcomer concatenates the .payforunlock extension to files and displays a ransom note with the inscription “Information Security”, which is quite sarcastic of the crooks.Unexpected findings regarding WannaCryResearchers unveil some new controversial characteristics of the WannaCry ransomware. It turns out that this perpetrating program is unable to work out which victims have submitted the ransom. An infection as sophisticated as this one definitely shouldn’t lack this ransomware-specific hallmark. This may suggest that WannaCry was originally tailored to fulfill goals other than extortion alone.JUNE 9, 2017In-dev Spectre ransomware with some potential under the hoodA new strain called Spectre is not in the wild thus far, but some uncovered details of its development process might indicate that it’s going to become a serious player in the cybercrime ecosystem. It boasts flawless encryption and robust Command & Control infrastructure. The Trojan scrambles file names and appends them with the .spectre extension. The ransom note is called HowToDecryptIMPORTANT!.txt.Update made to the Jaff ransomwareThe only noteworthy change made to the Jaff crypto malware is that it now concatenates the .sVn extension to files rather than the previously used .wlu string.MacRansom RaaSThe Ransomware-as-a-Service called MacRansom is shaping up to be the next big thing on the extortion arena. This underground affiliate network makes Mac ransomware available to wannabe cybercriminals.JUNE 10, 2017Encryption tweak of BeethoveN ransomwareThe recently discovered BeethoveN strain starts leveraging embedded RSA keys and email-based victim interaction principle instead of using a Command & Control server for these purposes. It demands $400 worth of Bitcoin for decryption.JUNE 11, 2017Law enforcement action against WannaCryFrench police confiscate a server hosting several Tor relays that were engaged for a WannaCry ransomware attack against a big local company. According to some unconfirmed reports, the overall number of Tor nodes seized in France around the same time was in the dozens.Svpps.xyz Trojan – no crypto, only screen lockingNew ransomware called Svpps.xyz displays a lock screen stating that the victim’s files are encrypted, while they actually aren’t. The size of the ransom is a BTC equivalent of $50.JUNE 12, 2017Facebook-themed ransomwareThe sample referred to as the Facebook Ransomware turns out to be a derivative of the Hidden Tear proof-of-concept code. Predictably enough, this one concatenates the .Facebook string to hostage data items.R4bb0l0ck ransomware targeting Dutch audienceThis baddie mainly proliferates in the Netherlands, so it displays a ransom note in Dutch named LEES_MIJ.txt (READ_ME.txt in English). It appends original filenames with the .R4bb0l0ck extension.One more Jigsaw version spottedThe latest offspring of the Jigsaw ransomware family uses the .Ghost extension to stain locked files. Those infected can use Michael Gillespie’s decryption tool to get their data back for free.The almost adorable Virus RansomwareA new sample on the extortion arena called Virus Ransomware displays a warning screen reading “Your PC Got Hacked” and containing an image of a toy from “My Little Pony” collection. Although it fails to perform data encryption, it requests $300 in Bitcoins. Victims can simply apply a commonplace malware eradication routine to address the issue.CA$HOUT ransomwareThis is another unsuccessful Trojan that’s incapable of enciphering files correctly. Despite its buggy gist, it demands a ransom of $100.Malicious affiliate platforms targeting MacsAnalysts come across two malware deployment frameworks delivering viable ransomware and spyware for macOS. One of them called MacRansom is a RaaS (Ransomware-as-a-Service) portal allowing crooks to fire up an extortion campaign of their own. The other, MacSpy, pushes spyware designed specifically for Macs.The disgusting GPAA ransomwareThe perpetrating app in question claims to emanate from an inexistent humanitarian organization named Global Poverty Aid Agency. It drops the !READ.htm ransom how-to titled “Save Children”, which asks for 1 Bitcoin as part of a fake crowdfunding initiative.JUNE 13, 2017Ransomware with lame OPSECA new strain is spotted that subjoins the .rnsmwre suffix to filenames and displays @decrypt_your_files.txt ransom note. Its unusual hallmark is the use of PaySafeCard for ransoms, which suggests that the attacker might be unprofessional.Jaff ransomware undergoes a changeFelons in charge of the Jaff ransomware campaign release an updated edition of the nasty program. The only modification is that the infection now leaves help manuals named !!!!!SAVE YOUR FILES!!!!.txt and !!!SAVE YOUR FILES!.bmp.Why-Cry, another crude sample in the wildThis new crypto malware is based on poorly coded open-source ransomware. It affixes the .whycry extension to encoded files and demands $300 worth of Bitcoin for recovery.Newsmaking incident in South KoreaLinux servers belonging to Nayana, a South Korean web hosting provider, get hit by a file-encrypting Trojan called Erebus. This attack calls forth disastrous collateral damage, as more than 3,000 websites get infected along the way. Ransom negotiations are ongoing.JUNE 14, 2017Jaff ransomware finally decryptedAnalysts from Kaspersky Lab spot an imperfection in the encryption routine utilized by the Jaff ransomware, a likely successor of Locky. The vendor’s updated RakhniDecryptor utility is now capable of decrypting files appended with the .jaff, .wlu, and .sVn strings.New BTCWare version releasedThe latest update of the prolific BTCWare strain introduces a small change. The pest switches to using the .[[email protected]].master file extension. This edition is categorized as MasterLock.EncrypTile ransomware crackedAvast creates a free decryptor for the file-scrambling infection called EncrypTile. Although this offending program has been in rotation since October 2016, it hasn’t made many victims and remained in the shade of more widespread ransomware families. EncrypTile goes with a user interface and supports multiple languages.Sage now manifests itself in a slightly different wayHTA ransom how-to dropped by the Sage ransomware doesn’t have an indication of the version number anymore. This is the only tweak made to the infection as part of this update.CryForMe ransomware in developmentThe immature sample called CryForMe may have Italian roots. It is based on Hidden Tear educational ransomware code. The ransom is set to €250 worth of Bitcoin.JUNE 15, 2017College in the UK falls victim to ransomwareEducational establishments are amongst cyber extortionists’ favorite targets. A recent incident involves University College London, whose computer network got compromised by an unnamed strain of ransomware. According to official UCL report, antimalware tools failed to block the infection, so this may have been a zero-day attack.CryptoSpider, a new one out thereThis infection displays a warning screen that says, “Hacked by ./Mr.Gh0s7_C47”. The extension affixed to hostage files is .Cspider.WinUpdatesDisabler spreading in the wildA new Hidden Tear based ransom Trojan called WinUpdatesDisabler is a garden-variety sample. It concatenates the .zbt suffix to encrypted data items.WinBan ransomwareThe specimen in question locks the screen with an alert reading, “Your Windows has been banned.” Malware researchers got hold of the unlock code that victims need to enter in the warning screen – it is 4N2nfY5nn2991.JUNE 16, 2017Executioner ransomware can be crackedThe author of Turkish EDA2-based crypto strain called Executioner reportedly made some critical mistakes when coding the infection. According to Michael Gillespie from MalwareHunterTeam, these flaws make the ransomware easy to decrypt.Sandwich ransomware keeps its makers hungryThis one is only a screen locker, so it doesn’t encrypt any files. It displays a picture of a sandwich on its warning screen. The two codes that do the unlock trick are as follows: 0941-4234-6354-0235 and 4215-2511-7845-2135.Screen-locking Cerber replicaA new ransom Trojan is spotted that impersonates the Cerber ransomware and claims to encrypt a victim’s important data. In fact, though, it simply locks the screen and demands 0.1 Bitcoin for the fix.JUNE 17, 2017Umpteenth Jigsaw offshootA fresh edition of the Jigsaw ransomware speckles encoded files with the .sux extension. It mostly targets Italian users.Another day, another WannaCry knockoffSecurity experts spot an in-dev specimen that impersonates the infamous WannaCry ransomware. In contrast to its prototype, though, it uses the “.Wana Decrypt0r Trojan-Syria Editi0n” file extension and displays a ransom warning with the dark color theme.JUNE 18, 2017WinBamboozle infection coming upThat’s quite an appropriate name for a piece of ransomware. This sample appends each hostage file with a unique extension consisting of five hexadecimal characters while leaving the original filename intact.JUNE 19, 2017SkullLocker isn’t as scary as it appearsThe Trojan called SkullLocker only locks the screen of a target host rather than encrypts a victim’s personal data. The good old Alt+F4 combo suffices to close the spooky-looking screen.The Dumb ransomware family expandsMore offspring of the Dumb ransomware strand appears. The newcomer displays a ransom note in Polish and demands 1,880 Zloty worth of Bitcoin (0.2 BTC).SamSam resurfacesThe authors of the SamSam ransomware release three new editions of this strain in one shot. These variants concatenate the .breeding123, .mention9823, and suppose666 extensions to encrypted files.DecryptOr 3.2 ransomwareResearchers keep discovering samples whose development is still in progress. One of these parasites is a half-baked specimen called DecryptOr 3.2. It is configured to request $100 worth of Bitcoin for decryption.NSMF strain wants Bitcoins or pizzaA Readme.txt note dropped by the NSMF ransom Trojan, which appends the .nsmf suffix to scrambled files, says “Send me 5 Bitcoins or pizza.” This infection is based on the academic Hidden Tear ransomware.JUNE 20, 20171-million-dollar ransom paidSouth Korean web host called Nayana decides to submit a mind-blowing ransom that amounts to $1 million worth of Bitcoin. The Erebus ransomware attack, which took place on June 10, crippled the company’s 153 Linux web servers and thus affected 3,400 hosted sites. Interestingly, this particular strain had been a Windows-only infection prior to this newsmaking onslaught against Nayana’s Linux environment.Kuntzware, a threat that doesn’t work as intendedPredictably enough, this one uses the .kuntzware file extension to label what has been encrypted. While it is supposed to skew a victim’s data and possibly even lock the screen, it currently crashes after starting up.Zilla ransomware updateThe baddie targets Turkish users. It affixes the .zilla string to filenames and provides decryption steps in a how-to document named @@BurayaBak.txt (“LookHere” in English).Gansta ransomware devs should work on their spellingThis sample concatenates the .enc extension to enciphered files. The ransom note says it’s “the only free ransomware”. Go figure what that is supposed to mean.Screen locker requesting sensitive informationNew screen-locking malware is spotted that instructs victims to enter their credit card details, including the number, expiration date, full name, and security code.Crypt888 variant treats files in an unusual wayA new edition of the Crypt888 ransomware is discovered. Whereas most crypto threats put certain character strings at the end of filenames, this one goes its own route and prepends the “Lock.” prefix to files instead. Another tweak is the new red desktop background that replaces the original.JUNE 21, 2017Car plant hit by WannaCryThe WannaCry ransomware attacked Honda car factory based in Sayama, Japan. The manufacturer was forced to stop the production process while implementing incident response measures.TeslaWare for saleNew ransomware kit called TeslaWare is discovered on the dark web. Its creators offer fellow-crooks a deal where the latter can buy their custom variant of the infection for €35-70. The offending program keeps deleting some files until the victim pays up. Analysts state this ransomware has serious functional flaws and can thus be decrypted without a ransom.Another ransomware hunt commencesMalwareHunterTeam’s Michael Gillespie publishes a tweet encouraging colleagues to help find samples of the aZaZeL ransomware. Its indicators of compromise include the .Encrypted file extension, File_Encryption_Notice.txt ransom note, and [email protected] contact email address.New Ruby-based ransomwarea fresh sample written in Ruby demonstrates that online extortionists keep experimenting with programming languages. Its modus operandi involves a domain generation algorithm (DGA).JUNE 22, 2017WannaCry won’t stop causing chaosThis nasty ransomware makes another high-profile victim. This time, it contaminates 55 road safety cameras in the Australian state of Victoria. As a result, local police cancel 590 tickets and stop issuing new ones until the problem is fixed.Locky is back but ill-conceivedThe Locky ransomware re-emerges after another pause in distribution that lasted more than a month. The Necurs botnet is still the one to blame for this novel propagation wave. The good news is the code has imperfections that prevent it from running on Windows editions later than Vista.CryptoDark specimen acts in a bizarre wayDespite the fact that this malicious entity manifests itself just like the average crypto ransomware, it does not actually encode any data. It demands $300 worth of Bitcoin regardless.Impostor mimicking CerberThe Trojan in question generates victim interaction modules resembling ones displayed by Cerber ransomware. According to researchers’ findings, though, it is an independently developed sample. This pseudo-Cerber appends the .encrypted extension to locked files.AlixSpy committing some data theftAs opposed to garden-variety ransomware, the strain called AlixSpy prefers theft to encryption. It steals a victim’s authentication details for Growtopia game then locks the screen and demands $20 worth of Bitcoin for unlocking.QuakeWay ransomwareThis one concatenates the .org extension to encrypted files and creates a ransom manual named _iWasHere.txt. Experts from MHT claim it can be decrypted.JUNE 23, 2017Most ransomware attacks stay in the darkThe FBI’s Internet Crime Complaint Center (IC3) releases a fresh annual Internet Crime Report. One of the interesting takeaways from it is that the majority of ransomware victims choose not to inform law enforcement about their quandary.Windows 10 S is susceptible to ransomwareWhite hat hackers decided to vet Microsoft’s reassurances that their newest Windows 10 S edition is invulnerable to ransomware attacks. Matthew Hickey from the Hacker House security firm was able to install a ransomware sample on brand-new Surface Laptop in a couple of hours.Odd modus operandi of the Reetner ransomwareThe sample in question employs a modular execution workflow. It means different executables are responsible for different processes involved in the extortion chain. For example, Noter.exe displays the ransom note, another executable encrypts files, and so on. If this approach becomes more widespread in the ransomware environment overall, it may significantly complicate detection and troubleshooting.Screen locker without financial motivationResearchers discover a new ransom Trojan whose impact is restricted to locking one’s screen. This doesn’t align with the text on the lock screen that states all personal files have been encrypted. According to the alert, the attacker doesn’t want money and won’t decrypt anything. Obviously, this whole campaign doesn’t make sense.HT based EyLamo ransomwareSimilarly to the strain called NSMF that demanded “Bitcoins or pizza” for decryption, the new EyLamo specimen asks for “BTC or kebab”. The two must have a common origin. EyLamo is a malicious offshoot of Hidden Tear that subjoins the .lamo extension to files and drops READ_IT.txt ransom how-to.Kryptonite sneaks inside as a primitive gameKryptonite ransomware infiltrates computers while passing itself off as a Snake game. It claims to use RSA-2048 cryptosystem and demands a Bitcoin equivalent of $500. Fortunately, it fails to even get to the encryption part of its abominable undertaking.JUNE 24, 2017Jigsaw ransomware updateA new Jigsaw edition is discovered that subjoins the .rat extension string to ciphered files. No other noteworthy changes have been made.Spear-extortion might be the next big thingResearchers from MHT come across a ransomware sample that displays READ_ME.txt ransom note tailored for a particular organization, namely the Eurogate Group. It is a Hidden Tear spinoff that stains files with the .locked extension.Rogue X-rated app turns out to be Android ransomwareAndroid ransom Trojan called Koler starts targeting United States users who visit an adult-themed site. Intrusive ads on this adult web resource recommend would-be victims to install a bogus app, which then displays FBI themed lock screen demanding a $500 penalty for watching prohibited content.JUNE 26, 2017Another ransomware disguised as a computer gameSecurity experts discover a Hidden Tear offshoot that infects machines while masquerading as the Battlefield game. Files encrypted by this sample get the .locked suffix appended to their original names.MMM ransomware in developmentThis one uses the .0x004867 string to blemish ransomed data and drops an additional file with the .info extension for every encoded data entry. The latter contains the corresponding cryptographic key. The MMM Trojan currently works in test mode.Samas gets a small tweakThe latest iteration of the extortion old-stager called Samas ransomware concatenates the .moments2900 suffix to filenames.Adverse aftermath of the Nayana incidentAfter the web host called Nayana agreed to cough up a $1 million ransom to Erebus ransomware distributors, other crooks started firing massive DDoS-for-ransom attacks at South Korean companies – obviously, in pursuit of huge payouts.JUNE 27, 2017Karo ransomware fails to impressHaving encoded data on a computer, this specimen adds the .ipygh string to filenames and leaves a recovery how-to called ReadMe.html on the desktop.Latvian ViaCrypt sample spottedThis strain got its name based on the .via extension concatenated to hostage files. It drops a ransom note in Latvian.The Shifr Ransomware-as-a-ServiceThe RaaS in question stands out form the pack. This malicious affiliate platform is amazingly easy for wannabe felons to join, with just a few custom parameters to define. Furthermore, the architects of Shifr only take a 10% share from subsequent ransoms, which is several times lower than the average cut in the ransomware distribution business. Researchers suspect such a low rate might have a flip side for newbie-extortionists, namely data theft from their machines by means of a stealth info-stealer module.Petya ransomware lookalike pops upAlso referred to as NotPetya or Petrwrap, this nasty infection spreads like wildfire in Ukraine, compromising state-owned banks, large private companies, and media. Its reach quickly expands to Western Europe. This pest affects the Master Boot Record (MBR) of a contaminated computer and encrypts the system’s Master File Table, thus completely locking users out of their machines.Petya-related mailbox blockedPosteo, the email provider whose services are used by Petya makers to interact with victims, blocks the corresponding email account [email protected] in light of fraudulent use. Analysts fear this is a wrong move that may prevent victims from regaining access to their computers and data.Offbeat infection vector used by PetyaNumerous reports start coming in about a peculiar entry point of the new Petya variant. The infection routine may be executed via a booby-trapped update for accounting software called M.E.Doc, which is widely used by Ukrainian enterprises.Prevention mechanism for Petya discoveredThis sophisticated ransom Trojan turns out to create and run a file named perfc.dat to operate inside a system. Therefore, it is possible to thwart the destructive routine by creating a read-only file with the same name in Windows folder.CryptoBubble lives up to its nameThis ransomware sample is easy to identify as it stains files with the .bubble extension. Fortunately, it has weak crypto. This allowed MHT’s Michael Gillespie to create a free decryption tool that pokes the bubble, figuratively speaking.Executioner ransomware updateA fresh edition of the Turkish ransom Trojan called Executioner switches to using random file extensions that consist of six hexadecimal characters.The new Petya isn’t classic ransomwareAccording to Kaspersky Lab, the most recent incarnation of Petya doesn’t provide any viable decryption options, no matter if a victim has paid up or not. This fact suggests that it must have been created for disruption and sabotage rather than commonplace online extortion.JUNE 28, 2017Ukraine is the epicenter of cyber attacksWhereas the Petya epidemic got the most press coverage, several more ransomware strains have been zeroing in on Ukrainian users lately. For instance, a sample called PSCrypt was claiming victims in said country in mid-June. These campaigns were preceded by the XData outbreak in May.More analysts state Petya is cyber warfareBased on evidence, the (Not)Petya ransomware does not pursue extortion goals. It does not provide victims with a decryption key even if they cough up the ransom. Looks like this whole campaign is a state-sponsored action targeting a particular country.MusicGuy Trojan getting on victims’ nervesThis is a new file-encrypting program on the computer crime arena. It concatenates the .locked suffix to each enciphered data item on a target machine.Random6 pest in the wildThis ransomware affixes a random 6-character string to affected files. It creates a ransom note in the format RESTORE-.[file extension]-FILES.txt, so its name is unique for every plagued user.Gank Ransom seems like a jokeSaid sample uses the .gankLocked file extension and READ_ME_ASAP.txt ransom how-to. Its demands are currently explicated in the following way: “You must send me one million Bitcoins to retrieve the key.” Someone is fooling around, obviously.Pirateware doesn’t do harm as intendedAt first sight, the in-dev Pirateware infection looks just like the average ransomware. It displays a warning screen that instructs the victim to send 0.1 BTC to a specific Bitcoin wallet. What makes it different from viable counterparts, though, is that it fails to encrypt any data.JUNE 29, 2017Microsoft’s clever anti-ransomware initiativeThe Corporation announced a new Windows Defender feature called Controlled Folder Access. It is scheduled to go live around October this year as part of Fall Creators Update. The objective of this promising feature is to prevent third-party code from making changes to data stored in system folders (by default) and custom directories defined by the user.Cerber morphs into CRBR EncryptorThis prolific ransomware begins manifesting itself as CRBR Encryptor. The updated variant drops ransom notes named _READ_THIS_[random]_.hta/txt, renames files, and appends them with four hexadecimal characters. It still arrives with malspam.Another ransom Trojan targeting UkraineAnalysts discover a new extortion campaign fired at this East European country. This time it’s a .NET based WannaCry copycat. The infection reportedly sticks with the same propagation mechanism as Petya, employing the M.E.Doc accounting software environment to contaminate computers.ABCScreenLocker is on its wayThis infection is half-baked and doesn’t spread in the wild at this point. As the name suggests, it is supposed to only lock the screen without encrypting anything on compromised hosts.Nemucod ransomware tweakA new offshoot of the Nemucod family surfaces that does not modify filenames or append any extensions. It displays an updated version of the ransom note that demands 0.45 BTC for data recovery.JUNE 30, 2017Petya was created for destruction, periodA growing number of security vendors state that the most recent iteration of the Petya ransomware does not provide decryption and system recovery options even if victims pay up. The main conclusion to draw from this fact is that the code is intended to do damage and disrupt the activity of target organizations.SUMMARYNot only does the present-day ransomware cause financial losses, but it can also shut down factories and affect critical infrastructure. The Petya ransomware outbreak has demonstrated how vulnerable organizations are when skilled threat actors come into play. Hopefully, Windows Defender’s upcoming Controlled Folder Access feature and perhaps some other new security initiatives will turn out to be game-changing.
About the Author: David Balaban is a computer security researcher with over 10 years of experience in malware analysis and antivirus software evaluation. David runs the www.Privacy-PC.com project which presents expert opinions on the contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy and white hat hacking. As part of his work at Privacy-PC, Mr. Balaban has interviewed such security celebrities as Dave Kennedy, Jay Jacobs and Robert David Steele to get firsthand perspectives on hot InfoSec issues. David has a strong malware troubleshooting background, with the recent focus on ransomware countermeasures.Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.