Ο εκβιαστής καλής θέλησης αναγκάζει τα θύματα σε καλές πράξεις

CloudSek specialists talked about a strange GoodWill ransomware that does not demand money from the victims, αλλά forces them do good deeds in exchange for decrypting files.

Για παράδειγμα, ransomware operators are told to distribute clothes to the homeless or pay medical bills to those who need urgent medical care but cannot afford it.

Let me remind you that we wrote about Η εμφάνιση του φθηνού DarkCrystal Ανησυχημένοι ειδικοί για κακόβουλο λογισμικό RAT, και επίσης αυτό Microsoft Warns of Increased XorDdos Malware Activity.

Σύμφωνα με τους ερευνητές, Φήμη και πελατεία is predominantly distributed in India and, apparently, was created in the same country. It is likely that the ransomware is someone’s experiment, since so far, the experts have not been able to detect a single GoodWill victim.

This malware was first noticed in March 2022. It is known that GoodWill is written in .NET and seems to be built on the basis of the open-source malware HiddenTear. After infecting the system, it sits idle for 722.45 seconds to confuse dynamic analysis and also uses the AES_Encrypt function to encrypt using AES.

After infection, GoodWill encrypts all documents, photos, videos, βάσεις δεδομένων, and other important files and leaves a note asking victims to do three good deeds to get the key to decrypt the data. Έτσι, malware operators require:

  1. donate new clothes to the homeless, record it on video and post it on social networks;
  2. take at least five children from disadvantaged families to Dominos, Pizza Hut ή KFC and feed them, take photos and videos of the process and post them on social networks;
  3. provide financial assistance to those who need urgent medical care but cannot afford it, record the entire conversation and share the audio recording with GoodWill operators.

Ransomware καλής θέλησης
Ransomware καλής θέλησης
Ransomware καλής θέλησης

After completing all these actions, the victim should also write another post on social networks, talking about “turning into a kind person after becoming a victim of the GoodWill ransomware.”

Προφανώς, after that, the ransomware operators check all media files and messages sent by the victim on social networks, and if the conditions are met, they provide a data decryption kit, which includes the decryptor itself, a file with passwords and a video tutorial on how to recover all important data.

Helga Smith

Ενδιαφέρομαι πάντα για τις επιστήμες των υπολογιστών, ειδικά την ασφάλεια δεδομένων και το θέμα, που ονομάζεται σήμερα "επιστημονικά δεδομένα", από τα πρώτα μου χρόνια. Πριν μπείτε στην ομάδα κατάργησης ιών ως αρχισυντάκτης, Εργάστηκα ως ειδικός στον τομέα της ασφάλειας στον κυβερνοχώρο σε πολλές εταιρείες, συμπεριλαμβανομένου ενός από τους εργολάβους της Amazon. Μια άλλη εμπειρία: Έχω διδάξει σε πανεπιστήμια Arden και Reading.

Αφήστε μια απάντηση

Αυτό το site χρησιμοποιεί Akismet να μειώσει το spam. Μάθετε πώς γίνεται επεξεργασία των δεδομένων σας σχόλιο.

Κουμπί Επιστροφή στην κορυφή