

DeathRansom currently spreads through phishing campaigns. The variant uses a combination of Curve25519 algorithm for the Elliptic Curve Diffie-Hellman (ECDH) key exchange scheme, Salsa20, RSA-2048, AES-256 ECB, and a simple block XOR algorithm for its encryption scheme. Fortinet researchers published a two-part analysis describing how DeathRansom now functions as an actual ransomware. wctc extension from any file to regain access to files.īut the newer versions are different. All a user had to do, however, was to remove the appended. Operators would attempt to trick users by adding a file extension to all of a target’s files and dropping a ransom note on the computer asking for money. Initial versions of DeathRansom pretended to be a ransomware and did not encrypt anything. Initially considered a joke, DeathRansom has now been found capable of encrypting files. DeathRansom ransomware evolves from fake ransomware to actual encrypting ransomware Last December, the ransomware hit “almost all Windows systems” at Maastricht University. The ransomware has since been tweaked to reportedly target entire networks instead of individual machines and even attempt disabling Windows Defender and other security tools. Security researcher Vitali Kremez enumerates the full list of terminated processes in his GitHub repository.Ĭlop first cropped up as a variant of the CryptoMix ransomware family. The disabled target processes include debuggers, text editors, and programming IDEs and languages running on the infected system. The Clop ransomware variant executes a “process killer” before starting the encryption processes. This action could either mean that configuration files used by some of the terminated processes are targeted for encryption or the threat actors are merely trying to ensure that the malware closes as many files as possible for successful encryption. It is not uncommon for ransomware variants to terminate processes before encrypting files some attackers even disable security software to evade detection. The latest Clop ransomware variant has been updated and is now capable of terminating a total of 663 Windows processes, including Windows 10 and Microsoft Office applications, before proceeding with its encryption routine. Clop ransomware kills Windows 10 apps, other processes companies for stealing and encrypting data, as alerted by the Federal Bureau of Investigation (FBI). Maze ransomware has been increasingly targeting U.S. DeathRansom, with initial versions that masqueraded as ransomware, now has the ability to encrypt files. Clop ransomware has evolved to integrate a process killer that targets Windows 10 apps and various applications. Updated on Januat 10:03 PM PST to change hashes to SHA-256 under IoCs.Īs the new year rolls in, new developments in different ransomware strains have emerged.
