Proofpoint: Three new variants of ransomware

Security researchers from Proofpoint discovered three new families of ransomware: CryptFlle2, BrLock, and MM Locker.

These three new versions of ransomware are part of a growing global trend in spreading ransomware over the past few months, with an increasing number of malware being released every month.ransomware

CryptFIle2

CryptFIle2 surfaced in mid-March 2016, and Proofpoint reports that the crooks are using Neutrino and Nuclear kits to distribute the malware to their victims.

This particular ransommare is very simplistic at this point, isn't it some payment or decryption service, and to recover them of, he should contact the creator of the ransomware via e-mail and negotiate a price for decryption.

Researchers report that the application uses RSA-2048 encryption and could be a clone of CryptoBoss ransomware.

BrLock

The second ransomware discovered by the researchers discovered was called BrLock, and was first observed ten days ago at 18 April. It targets only users from Russia.

The of the application they even ask for 1.000 rubles (around 15 dollars) for ransom. The low ransom price is indicative of geographic targeting as Russians typically do not have the financial resources to pay exorbitant ransom demands, as victims in the West do. .

Ransomware only locks the computer screen and does not encrypt the files. So if someone finds a way to bypass the screen lock, they can use the computer normally.

MM Locker

This ransomware was discovered in early March, and uses encryption to lock users' files, and adds the ".locked" extension to all encrypted files.

The specificity of MM Locker is the ransom note, which is quite large and tries to persuade the victim to pay.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.090 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).