Threat Database Ransomware Whole Ransomware

Whole Ransomware

Researchers have discovered a new ransomware threat called 'Whole.' This hurtful software is designed to encrypt data on infected systems and then demand ransoms from the PC owner in exchange for the decryption key. To carry out its destructive operation, the Whole Ransomware locks various types of files and appends the names of each file with a '.whole' extension. For example, if a file were originally named '1.jpg,' after the encryption, it would be renamed to '1.jpg.whole.' This renaming process affects all types of files, such as images, documents,and more.

In addition to encrypting files, the Whole Ransomware also alters the desktop wallpaper of the infected system, making it clear that the system has been compromised. Furthermore, the ransomware creates a ransom note with the title 'README-ID-[victim's_ID].txt' on the breached device. The contents of this note serve as a message to the victim, providing instructions on how to pay the demanded ransom and obtain the decryption key.

The ransom note and other clues suggest that this particular ransomware is primarily aimed at companies and organizations rather than individual home users. This indicates a higher level of sophistication and possibly more substantial ransom demands. It is worth noting that the Whole Ransomware appears to share similarities with the Keylock Ransomware, suggesting a potential connection or lineage between the two threats.

The Whole Ransomware Locks Victims from Accessing Their Own Data

The message displayed on the desktop wallpaper by the Whole Ransomware provides instructions to the victim, directing them to read the accompanying text file labeled 'README-ID-[victim's_ID].txt.' This ransom note serves as a crucial communication from the attackers, revealing that the victim's files have been encrypted and are now inaccessible. It also states that the unique decryption key required to recover the encrypted data is securely stored on the attackers' servers.

Victims are presented with an option to test the decryption process free of charge. This can be done by sending a few encrypted files to the cybercriminals, subject to certain specifications. An important caveat is that if the victim fails to initiate communication with the attackers within a 72-hour window, their sensitive business-related data is threatened with exposure through leakage or sale.

The ransom-demanding message concludes with several warnings. The victim is alerted that any attempts to rename or otherwise modify the affected files, as well as the use of third-party data recovery tools or security software, may render the data undecryptable. It emphasizes that decryption typically requires the direct involvement of the cybercriminals, with only rare exceptions in cases of severely flawed ransomware.

It should be noted that victims often do not receive the promised decryption keys or tools, even after complying with the ransom demands and making payments. As a result, it is strongly advised against yielding to the criminals' demands, as data recovery remains uncertain, and paying the ransom serves to perpetuate this illegal activity.

Important Security Measures to Implement on Your Devices

Protecting your devices against malware intrusions is a crucial aspect of maintaining cybersecurity. Here are five important security measures, with one of them being creating regular backups of your data:

Creating Regular Backups of Data:

Regular data backups are essential. In the event of a malware attack, having updated backups ensures that you can recover your information without paying a ransom or suffering permanent data loss. Back up your data to external devices, cloud storage, or network-attached storage (NAS) regularly. Automate this process, if possible, and verify the integrity of your backups.

Installing and Updating Security Software:

Install trustworthy anti-malware software and keep it up to date. Security programs can detect and remove known malware, providing a crucial layer of defense against threats. Ensure that your antivirus software automatically updates its virus definitions to protect against new malware variants.

Regular Software Updates and Patch Management:

Keep your device's operating system, software applications, and firmware up to date. Malware often exploits vulnerabilities in outdated software. Regularly apply security patches and updates to close these vulnerabilities, reducing the risk of malware infiltration.

Firewall Protection:

Enable and configure a firewall on your device. Firewalls function as a barrier between your device and the internet, helping block unauthorized access and potentially malicious data. Use both network and host-based firewalls to enhance your security, and consider using intrusion detection and prevention systems for advanced protection.

Safe Internet and Email Practices:

Exercise caution when browsing the internet and handling emails. Avoid interacting with suspicious links or downloading email attachments from unknown or unverified sources. Be aware of phishing attempts and refrain from providing personal information or clicking on suspicious pop-up ads. Employ email filtering tools to help identify and block potentially harmful messages.

Incorporating these security measures into your device usage will significantly reduce the risk of malware intrusions. Regular data backups are particularly important because they provide a safety net in case malware does breach your defenses. By maintaining a proactive and multi-layered security approach, you can better protect your devices and data from malicious threats.

The full text of the ransom note created by Whole Ransomware is:

'YOUR FILES ARE ENCRYPTED

-
Your files have been encrypted with strong encryption algorithms and modified!
Don't worry your unique encryption key is stored securely on our server and your data can be decrypted quickly and securely.
-
We can prove that we can decrypt all of your data. Please just send us 3 not important, small(~2mb) encrypted files, which are randomly stored on your server. Also attach your this file README-ID-.txt left by us in every folder.
We will decrypt these files and send them to you as a proof. Please note that files for free test decryption should not contain valuable information.
-
If you will not start a dialogue with us in 72 hours we will be forced to publish your files in the public domain. Your customers and partners will be informed about the data leak.
This way, your reputation will be ruined. If you will not react, we will be forced to sell the most important information such as databases and personal data to interested parties to generate some profit.
-
If you want to resolve this situation, attach in letter this file README-ID-.txt and write to ALL of these 2 email addresses:

pmmx@techmail.info

wholekey@mailfence.com -
IMPORTANT!

We recommend you contact us directly to avoid overpaying agents.

We asking to send your message to ALL of our 2 email adresses because for various reasons, your email may not be delivered.

Our message may be recognized as spam, so be sure to check the spam folder.

If we do not respond to you within 24 hours, write to us from another email address.

Please don't waste the time, it will result only additinal damage to your company.

Please do not rename and try to decrypt the files yourself. We will not be able to help you if files will be modified.

If you will try to use any third party software for restoring your data or antivirus solutions, please make a backup for all encrypted files.

If you delete any encrypted files from the current computer, you may not be able to decrypt them.

The desktop background image of Whole Ransomware contains the following message:

All your files are stolen and encrypted!
Find README-ID-.txt and follow the instruction.'

Related Posts

Trending

Most Viewed

Loading...