威胁数据库 Ransomware 致命锁勒索软件

致命锁勒索软件

在检查潜在恶意软件威胁时,网络安全研究人员发现了一种名为 Lethal Lock 的勒索软件变种。此威胁会加密文件,并在其原始文件名中添加“.LethalLock”作为新扩展名。此外,Lethal Lock 还会在受感染的设备上创建勒索信,作为名为“SOLUTION_NOTE.txt”的文本文件。该威胁还会修改受害者的桌面壁纸。

例如,威胁会将受影响数据的文件名“1.png”更改为“1.png.LethalLock”,“2.pdf”更改为“2.pdf.LethalLock”,等等。

致命锁勒索软件向受害者勒索巨额款项

勒索信首先承认,一个名为“LETHAL LOCK”的网络实体破坏了服务器安全。随后,信中详细介绍了文件的加密过程,称其非常复杂,如果没有解密密钥,几乎不可能逆转。信中对违抗勒索要求的行为发出了严厉警告,强调如果在 72 小时内不支付赎金,将面临永久性数据丢失的风险,并会立即产生后果。

提供了通过 Telegram (@lethallock) 联系客户支持并转移 25 比特币以换取解密密钥的说明。

建议受害者不要满足赎金要求,因为攻击者在付款后提供必要的解密工具,不太可能履行承诺。同时,必须立即从受感染的计算机中删除勒索软件,以减轻进一步的数据丢失,并防止可能传播到同一网络内的其他设备。

采取有效措施保护你的设备免受恶意软件侵害

实施强大的网络安全措施对于保护设备免受恶意软件威胁至关重要。以下是用户应遵循的一些基本做法:

  • 安装和更新安全软件:利用信誉良好的反恶意软件并保持其更新以检测和删除恶意软件。
  • 启用防火墙保护:在任何设备上激活防火墙以观察和控制网络流量,防止未经授权的访问并阻止恶意软件。
  • 保持操作系统和软件更新:始终更新您的操作系统、应用程序和软件,以修补潜在的安全漏洞并防范恶意软件使用的已知漏洞。
  • 点击链接和下载文件时请谨慎:请务必小心处理未经请求的电子邮件、可疑链接和来自未指定来源的附件,因为它们可能包含恶意软件。在点击链接或下载文件之前,请验证发件人的真实性。
  • 使用强大而独特的密码:为您的帐户创建强密码,避免在多个平台上使用相同或相似的密码。
  • 启用双因素身份验证 (2FA) :尽可能启用 2FA 可以为帐户增加一层安全性,使攻击者更容易获得未经授权的访问。
  • 养成安全浏览习惯:仅使用安全的 HTTPS 连接访问受信任的网站,避免点击来自未经验证来源的广告或弹出窗口。从互联网下载软件时要小心谨慎,并验证来源的合法性。
  • 定期备份数据:实施定期备份策略,创建重要文件和数据的副本。将备份存储在单独的设备或云中,以减轻恶意软件感染时数据丢失的影响。
  • 自我教育并保持知情:查找恶意软件作者使用的最新网络安全威胁和技术。自我教育和团队成员了解常见的攻击媒介、网络钓鱼策略以及保持在线安全的最佳实践。
  • 利用安全功能:充分利用设备提供的安全功能,例如设备加密、生物特征认证以及在发生盗窃或丢失时的远程擦除功能。
  • 通过遵循这些网络安全最佳实践,用户可以降低恶意软件感染的风险,并显著保护他们的设备和数据免受恶意威胁。

    Lethal Lock 勒索软件释放的赎金纸条内容如下:

    'Oh, what an exquisite predicament has befallen you!

    We take immense pleasure in informing you, without the slightest pang of regret that your server security has been breached & immortalized by LETHAL LOCK, a majestic entity in the realm of cyber command.

    Marvel at the masterpiece of encryption we have orchestrated, utilizing algorithms of such complexity and military-grade standards that they render your critical documents as elusive as a mirage in the desert.

    Your files now dance to the tune of an encryption algorithm so intricate, so enigmatic, that mortals tremble at its sight.

    Should you dare to defy our demands, be prepared for the consequences — your data will remain locked away forever and we will sell them to a third party on the Dark Web or use them as a trade by barter on the Dark-Web to get higher upgraded tools to dismantle your organization within a twinkle of an eye.

    Any futile attempts to decipher this cryptographic masterpiece, appeal to law enforcement, or seek assistance from less reputable cybersecurity entities will only hasten the irreversible disappearance of your confidential datas and the swift deletion of the decryption key.

    Your enduring rule, should you choose to accept it, is to comply with our ransom payment demands within 72 hours (3days). Failure to meet this demand will result in the permanent loss of your decryption key, accompanied by a symphony of data obfuscation maneuvers that thwart even the most valiant attempts at file recovery.

    To embark on this momentous path of payment and data liberation:

    1) Reach out to our esteemed customer support service on Telegram: @lethallock (For those evading payment, we suggest enjoying a hot cup of coffee while witnessing the swift datas/files wipe out orchestrated by the Lethal Lock algorithms).

    2) Acquire and transfer 25 bitcoins with express efficiency. Remember, our treasuries crave bitcoins, and in return, we will provide you with the coveted decryption key that unlocks the chest of digital wealth.

    Follow these crucial instructions:

    1) Keep your computer powered on and connected to the digital world.

    2) Resist all temptations to use data recovery tools without our permission.

    3) Execute the bitcoin transfer with surgical precision before the time extinguish your chance for redemption.

    In your cryptographic triumph,

    Van Dmitry Vladimir

    Senior Director of Operations
    Lethal Lock Tech Company - LLTC'

    趋势

    最受关注

    正在加载...