Cash Ransomware

V digitalni dobi pomena varovanja vaših naprav in podatkov ni mogoče preceniti. Kibernetske grožnje, zlasti izsiljevalska programska oprema, postajajo vse bolj izpopolnjene in predstavljajo resna tveganja za posameznike in organizacije. Ena takih nastajajočih groženj je Cash Ransomware, nevarna programska oprema, zasnovana za šifriranje datotek na okuženih napravah in zahteva plačilo za njeno sprostitev. Razumevanje te grožnje in izvajanje robustnih varnostnih praks sta ključnega pomena za zaščito vaših digitalnih sredstev.

Kaj je Cash Ransomware?

Cash Ransomware je posebna vrsta zlonamerne programske opreme, ki je znana po šifriranju podatkov na ogroženih napravah in zahtevanju odkupnine za dešifriranje. To izsiljevalsko programsko opremo pripisujejo istim akterjem grožnje, ki stojijo za Cash RAT (trojanec za oddaljeni dostop) in MintStealer, kar kaže na dobro organizirano in vztrajno skupino kibernetskih kriminalcev.

Kako deluje izsiljevalska programska oprema Cash

Ko je izsiljevalska programska oprema Cash aktivirana na ogroženi napravi, šifrira datoteke in vsaki prizadeti datoteki doda pripono ».CashRansomware«. Na primer, '1.doc' postane '1.doc.CashRansomware,' in '2.pdf' se preimenuje v '2.pdf.CashRansomware.' Po postopku šifriranja izsiljevalska programska oprema ustvari tri različne opombe o odkupnini: novo ozadje namizja, pojavno okno in datoteko HTML z imenom 'Cash Ransomware.html.'

Zahteve po odkupnini in opozorila

Opombe o odkupnini, čeprav niso enake, posredujejo iste ključne informacije:

  • Obvestilo o šifriranju datoteke.
  • Zahteva po odkupnini v višini 80 USD v kriptovaluti Monero (XMR).
  • Opozorila pred ponovnim zagonom naprave ali izvajanjem programov proti zlonamerni programski opremi lahko povzročijo, da datotek ni mogoče dešifrirati.
  • Navodila za izogibanje prekinitvi povezave z omrežjem, da zagotovite pogajanja in obnovitev.

Opombe tudi določajo, da so bile datoteke šifrirane z uporabo naprednih kriptografskih algoritmov: XChaCha20, Poly1305 in AES-256-GCM. Strokovnjaki za kibernetsko varnost pa opozarjajo, da plačilo odkupnine ne zagotavlja povrnitve podatkov, saj kibernetski kriminalci tudi po plačilu pogosto ne posredujejo ključa za dešifriranje.

Najboljše varnostne prakse za preprečevanje napadov izsiljevalske programske opreme

Preprečevanje izsiljevalske programske opreme, vključno z izsiljevalsko programsko opremo Cash, zahteva proaktiven pristop k kibernetski varnosti. Tukaj je nekaj najboljših praks, ki bi jih morali uporabniki uporabiti za izboljšanje obrambe pred izsiljevalsko programsko opremo in drugimi grožnjami zlonamerne programske opreme:

  • Redne varnostne kopije : redno varnostno kopirajte vse bistvene podatke na zunanji pogon ali shrambo v oblaku. Prepričajte se, da varnostne kopije niso stalno povezane z omrežjem, da preprečite njihovo ogrožanje med napadom.
  • Uporabite robustno programsko opremo proti zlonamerni programski opremi : namestite in vzdržujte posodobljeno programsko opremo proti zlonamerni programski opremi. Omogočite skeniranje v realnem času in samodejne posodobitve za zaščito pred najnovejšimi grožnjami.
  • Posodabljajte programsko opremo : Zagotovite, da so operacijski sistem, aplikacije in programska oprema vedno posodobljeni z najnovejšimi razpoložljivimi posodobitvami in popravki. To zmanjša ranljivosti, ki jih lahko izkoristi izsiljevalska programska oprema.
  • Vadite varno brskanje in e-poštne navade : Bodite pozorni, ko dostopate do povezav ali prenašate priloge iz neznanih virov. E-poštna sporočila z lažnim predstavljanjem so dobro znan vektor za distribucijo izsiljevalske programske opreme.
  • Nastavite močna gesla in večfaktorsko avtentikacijo : uporabite zapletena, edinstvena gesla za različne račune in omogočite večfaktorsko avtentikacijo (MFA), kjer koli je to mogoče, da dodate dodatno raven varnosti.
  • Onemogoči makre v datotekah Officea : Onemogočite makre v datotekah Microsoft Office, prejetih iz nezaupljivih virov, saj jih je mogoče uporabiti za zagon izsiljevalske programske opreme.
  • Izobražujte sebe in druge : Ostanite poučeni o najnovejših kibernetskih grožnjah in poučite svojo družino, prijatelje in sodelavce o varnih spletnih praksah in nevarnostih izsiljevalske programske opreme.
  • Porast groženj izsiljevalske programske opreme, kot je izsiljevalska programska oprema Cash, poudarja kritično potrebo po pazljivosti in robustnih ukrepih kibernetske varnosti. Z razumevanjem narave teh groženj in izvajanjem najboljših varnostnih praks lahko uporabniki občutno zmanjšajo možnosti, da postanejo žrtve napadov z izsiljevalsko programsko opremo. Ne pozabite, preprečiti je vedno bolje kot zdraviti in proaktiven pristop k kibernetski varnosti je vaša najboljša obramba pred digitalnimi grožnjami.

    Opomba o odkupnini, ki se prikaže v pojavnem oknu:

    'Cash RANSOMWARE

    YOUR FILES
    ARE ENCRYPTED
    BY CASH RANSOMWARE

    What happend?

    Dear , We regret to inform you that your files have been compromised by the insidious Cash Ransomware program. This ruthless malware has infiltrated your system, encrypting your precious data and holding it hostage until its demands are met. Below are the chilling details of this dire situation:

    Rapid scanning of your storage drives has been executed, leaving no corner untouched by the malicious claws of Cash Ransomware.
    Utilizing the advanced XChaCha20 encryption algorithm, your files have been ensnared with unbreakable tags and a deadly combination of Poly1305 or AES-256-GCM, meticulously chosen by the ransomware's constructors to ensure maximum devastation.
    To further fortify its grip on your data, Cash Ransomware employs a hybrid bulletproof encryption technique, rendering any attempts at decryption futile against its impenetrable defenses.
    Files bearing specific extensions have been singled out for priority encryption, ensuring that your most critical data is held captive, intensifying the fear and desperation of your predicament.
    As a final blow to any hopes of recovery, Cash Ransomware deploys a double-key encryption mechanism, thwarting any attempts at deception or circumvention, leaving you no recourse but to comply with its demands.
    In light of this harrowing situation, we implore you to refrain from taking any actions that may exacerbate the damage and worsen your plight:

    Do not download antivirus software: Any attempts to combat Cash Ransomware with conventional means will only serve to alert its creators, potentially triggering further encryption or irreversible data loss.
    Do not disconnect from the network: Isolation will not shield you from the relentless reach of Cash Ransomware; instead, it may hinder potential avenues of negotiation or resolution.
    Do not reboot your systems: Restarting your devices could disrupt ongoing encryption processes, rendering your files irretrievable and sealing your fate in the clutches of this merciless malware.
    We understand the gravity of your situation and stand ready to assist you in navigating this crisis. However, time is of the essence, and decisive action is imperative to mitigate the extent of the damage inflicted by Cash Ransomware.

    How to decrypt my files?

    Your files are heavily encrypted, and none can be decrypted without the decryption key.
    To obtain the decryption key, you need to make a payment to the specified amount to the XMR / Monero wallet.
    Once you've made the payment, you should contact the attackers via email or Telegram to receive the decryption key.
    After receiving the decryption key, you need to input it into the decryption panel in Cash.
    Once you hit the decryption button, your files will be decrypted.'

    Obvestilo o odkupnini dostavljeno kot datoteka HTML:

    'ATTENTION!'ATTENTION!

    YOUR FILES ARE ENCRYPTED BY Cash RANSOMWARE

    Dear user, We regret to inform you that your files have been compromised by the insidious XChaCha20 encryption algorithm, your files have been ensnared with unbreakable tags and a deadly combination of Poly1305 or AES-256-GCM, meticulously chosen by the ransomware's constructors to ensure maximum devastation.
    To further fortify its grip on your data, Cash Ransomware employs a hybrid bulletproof encryption technique, rendering any attempts at decryption futile against its impenetrable defenses.
    Files bearing specific extensions have been singled out for priority encryption, ensuring that your most critical data is held captive, intensifying the fear and desperation of your predicament.
    As a final blow to any hopes of recovery, Cash Ransomware deploys a double-key encryption mechanism, thwarting any attempts at deception or circumvention, leaving you no recourse but to comply with its demands.
    In light of this harrowing situation, we implore you to refrain from taking any actions that may exacerbate the damage and worsen your plight:

    Do not download antivirus software: Any attempts to combat Cash Ransomware with conventional means will only serve to alert its creators, potentially triggering further encryption or irreversible data loss.
    Do not disconnect from the network: Isolation will not shield you from the relentless reach of Cash Ransomware; instead, it may hinder potential avenues of negotiation or resolution.
    Do not reboot your systems: Restarting your devices could disrupt ongoing encryption processes, rendering your files irretrievable and sealing your fate in the clutches of this merciless malware.

    We understand the gravity of your situation and stand ready to assist you in navigating this crisis. However, time is of the essence, and decisive action is imperative to mitigate the extent of the damage inflicted by Cash Ransomware.

    85kCbkZzeaeiSx8h47yFjwUJ8u41FqgbpFbqGp5C93Rpa9eU 7pcYdp5Y7LNSrHkEVmTYa4oCuLeNnHGxVBLH78Uo2XEkXpZ
    Copy Monero

    dolores@bpe.cash
    Copy Email

    80$
    Copy Amount'

    Sporočilo, prikazano žrtvam kot slika ozadja namizja:

    'CASH RANSOMWARE'All computer got infected by Cash Ransomware.
    All your personal files are encrypted
    Using an unique and advanced encryption algorithm.'All computer got infected by Cash Ransomware.
    All your personal files are encrypted
    Using an unique and advanced encryption algorithm.

    If you need your computer or your files
    Please kindly follow steps on the software.
    You can contact people that infected that
    Computer by sending an email
    Please check the Ransomware to get the email.

    Avoid to install an anti-virus, installing a anti-virus
    Will delete the Ransomware without decrypting files.
    Please note that we won't be able to help you
    If you're trying to bypass our system.

    CASHRANSOMWARE'

    Sorodne objave

    V trendu

    Najbolj gledan

    Nalaganje...