善意勒索者強迫受害者行善

CloudSek specialists talked about a strange GoodWill ransomware that does not demand money from the victims, 但 forces them do good deeds in exchange for decrypting files.

例如, ransomware operators are told to distribute clothes to the homeless or pay medical bills to those who need urgent medical care but cannot afford it.

Let me remind you that we wrote about 廉價的出現 黑水晶 RAT 惡意軟件專家, 惡意軟件寫道,如果公司向他們付款,他們準備披露他們利用的零日漏洞的所有細節 Microsoft Warns of Increased XorDdos Malware Activity.

據研究人員稱, 善意 is predominantly distributed in India and, apparently, was created in the same country. It is likely that the ransomware is someone’s experiment, since so far, the experts have not been able to detect a single GoodWill victim.

This malware was first noticed in March 2022. It is known that GoodWill is written in .NET and seems to be built on the basis of the open-source malware HiddenTear. After infecting the system, it sits idle for 722.45 seconds to confuse dynamic analysis and also uses the AES_Encrypt function to encrypt using AES.

After infection, GoodWill encrypts all documents, photos, videos, 數據庫, and other important files and leaves a note asking victims to do three good deeds to get the key to decrypt the data. 所以, malware operators require:

  1. donate new clothes to the homeless, record it on video and post it on social networks;
  2. take at least five children from disadvantaged families to Dominos, Pizza Hut 要么 KFC and feed them, take photos and videos of the process and post them on social networks;
  3. provide financial assistance to those who need urgent medical care but cannot afford it, record the entire conversation and share the audio recording with GoodWill operators.

善意勒索軟件
善意勒索軟件
善意勒索軟件

After completing all these actions, the victim should also write another post on social networks, talking about “turning into a kind person after becoming a victim of the GoodWill ransomware.”

顯然, after that, the ransomware operators check all media files and messages sent by the victim on social networks, and if the conditions are met, they provide a data decryption kit, which includes the decryptor itself, a file with passwords and a video tutorial on how to recover all important data.

赫爾加·史密斯

我一直對計算機科學感興趣, 特別是數據安全和主題, 現在被稱為 "數據科學", 從我十幾歲起. 在加入病毒清除團隊擔任主編之前, 我曾在多家公司擔任網絡安全專家, 包括亞馬遜的一名承包商. 另一種體驗: 我在雅頓大學和雷丁大學任教.

發表評論

本網站使用的Akismet,以減少垃圾郵件. 了解您的意見如何處理數據.

返回頂部按鈕