GIBON Ransomware sold for $500 in Russian dark web criminal forum
The GIBON Ransomware variant was on sale with a $500 price tag in Russian dark web criminal forum advertisement. The advertisement said that GIBON has the ability to use recursive encryption, leave README.txt files in messages to users, encryption keys sent to admin and create both encryption and decryption keys. Once the system is infected, the malware adds the .encrypt extension to the encrypted file’ s name.
The malware was first found by ProofPoint researcher Matthew Mesa who found out it was being distributed via malspam with malicious document attached that contained macros.
The malware’ s command and control server only supplies the ransom note to its victims. This in turn allows the developer to update it without having to compile a new executable. Victims who are registered to the C2 server and ransomware will generate an encryption key locally as base64 encoded string.
The malware encrypts the devices targeting all the files irrespective of their file extensions.
It’ s still unclear on how much money the ransomware is demanding but researchers have been instructed to contact the following emails bomboms123@mail.ru and yourfood20@mail.ru for payment instructions.
The encryption is done with a 2048-bit key and the criminals challenge that it is impossible to decrypt files by standard methods.
Comments ( 0 )
No comments available