Marnet is a ransomware threat that encrypts and renames files, adding the extension '.marnet2' to the original filenames. The Marnet Ransomware also drops a ransom note in the form of an HTML file called 'how_to_back_files.html.' Once infected, users may find their files renamed with that extension, such as '1.jpg.marnet2,' '2.png.marnet2,' and so on, with the number in the extension potentially changing from case to case. The Marnet Ransomware belongs to a family of ransomware known as MedusaLocker.
Marnet Ransomware's Demands
Victims of this ransomware are warned that attempting to restore their files using third-party software will permanently damage them, and their files cannot be decrypted without the interference of the attackers. The ransom note also states that personal data has been gathered and will be disclosed to the public or sold to competitors/third parties if victims refuse to pay the ransom. To contact the threat actors, victims are provided with a Tor website and two email addresses ('firstname.lastname@example.org' and 'email@example.com'). Furthermore, failure to contact the cybercriminals within 72 hours will result in an increased price for decryption.
How is a Ransomware Attack Executed?
One of the common infection strategies used by attackers is to send out lure emails containing corrupted links or attachments disguised as being from trusted sources, such as banks, e-commerce sites or other known companies. If the users fall for it, they will click on the link and be directed to a Web page hosting malware that is used to infect their systems with ransomware.
Cyberattackers also often exploit weaknesses in unpatched software and operating systems so they can gain access to the targeted devices without users knowing it. Once they gain access, they can install ransomware that will encrypt the data on the system.
Marnet Ransomware's full ransom note is:
'YOUR PERSONAL ID:
YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\
All your important files have been encrypted!
Your files are safe! Only modified. (RSA+AES)
ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE
WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.
No software available on internet can help you. We are the only ones able to
solve your problem.
We gathered highly confidential/personal data. These data are currently stored on
a private server. This server will be immediately destroyed after your payment.
If you decide to not pay, we will release your data to public or re-seller.
So you can expect your data to be publicly available in the near future..
We only seek money and our goal is not to damage your reputation or prevent
your business from running.
You will can send us 2-3 non-important files and we will decrypt it for free
to prove we are able to give your files back.
Contact us for price and get decryption software.
Note that this server is available via Tor browser only
Follow the instructions to open the link:
Type the addres "hxxps://www.torproject.org" in your Internet browser. It opens the Tor site.
Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.
Now you have Tor browser. In the Tor Browser open qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion
Start a chat and follow the further instructions.
If you can not use the above link, use the email:
firstname.lastname@example.org. To contact us, create a new free email account on the site: protonmail.com
IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.'