Threat Database Ransomware Lucky Ransomware

Lucky Ransomware

Cybersecurity researchers have discovered a ransomware threat known as Lucky. The Lucky Ransomware encrypts files and modifies their original filenames by appending a unique ID, the email address of the cyber criminals, and a '.Lucky' extension. For instance, a file originally named '1.doc' will appear as '1.doc.id[9ECFA74E-3451].[dopingen@rambler.ru].Lucky,' and so on.

Once the encryption process is completed, this ransomware creates ransom notes in a pop-up window ('info.hta') and a text file ('info.txt'). This threatening program has been confirmed to be a variant belonging to the Phobos Ransomware family.

Victims of the Lucky Ransomware are Extorted for Money

The ransomware note found in the text file simply informs the victim that their files have been encrypted and provides instructions to contact the attackers.

On the other hand, the note displayed in the pop-up window offers more details about the infection. It explicitly states that the victim must pay a ransom in Bitcoin cryptocurrency to obtain the decryption key for their data. To validate the decryption process, the victim is allowed to send up to five encrypted files to the cybercriminals, following specific guidelines.

Furthermore, the message includes a warning that altering the filenames of the affected files or utilizing third-party recovery software can lead to permanent data loss.

Regretfully, decryption without the involvement of the attackers is generally not feasible. Moreover, even if the ransom is paid, the victims of a ransomware often do not receive the promised decryption keys or software. Therefore, we strongly advise against complying with the ransom demands as it not only fails to guarantee data recovery but also supports illegal activities.

Users Should Take Effective Defensive Measures Against Ransomware Threats

Users can take several defensive measures to protect their devices and data from ransomware threats. Here are some essential steps:

  • Install and Update Anti-malware Software: Use reputable security software and keep it up to date. Anti-malware programs can detect and block known ransomware threats.
  •  Enable Automatic Software Updates: Regularly update your operating system, applications, and security patches. Software updates often include security enhancements that protect against known vulnerabilities exploited by ransomware.
  •  Exercise Caution with Email Attachments and Links: Be cautious when clicking on links or accessing email attachments, especially if they come from unfamiliar or suspicious sources. Ransomware often spreads through malicious email attachments and phishing links.
  •  Backup Data Regularly: Create regular backups of your important files and data. Store backups on offline or cloud-based platforms. This way, even if your files get encrypted by ransomware, you can restore them from backups without paying a ransom.
  •  Use Strong and Unique Passwords: Create strong, complex passwords for your accounts and avoid reusing them across multiple platforms. Consider using password managers to store and generate unique passwords securely.
  •  Be Wary of Downloads: Download files and software only from trusted sources. Avoid downloading files from unfamiliar or suspicious websites, as they can contain ransomware or other malware.
  •  Educate Yourself: Stay informed about the latest ransomware threats and techniques. Educate yourself and your employees about safe computing practices, including recognizing phishing attempts and suspicious online behavior.

By implementing these defensive measures, users can significantly reduce the probability of falling victim to ransomware attacks and protect their devices and valuable data.

The pop-up window generated by the Lucky Ransomware contains the following message:

'All your files have been encrypted!

All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail dopingen@rambler.ru
Write this ID in the title of your message -
In case of no answer in 24 hours write us to this e-mail:dopingen@rambler.ua
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the tool that will decrypt all your files.

Free decryption as guarantee
Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 4Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)

How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price.
hxxps://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/

Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

The text file dropped by Lucky Ransomware states:

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: dopingen@rambler.ru.
If we don't answer in 24h., send e-mail to this address: dopingen@rambler.ua'

Related Posts

Trending

Most Viewed

Loading...