威脅數據庫 Ransomware 現金勒索軟體

現金勒索軟體

在數位時代,保護設備和資料的重要性怎麼強調也不為過。網路威脅,特別是勒索軟體,變得越來越複雜,對個人和組織造成嚴重風險。其中一個新興威脅是現金勒索軟體,這是一種威脅軟體,旨在加密受感染設備上的文件並要求付費才能發布。了解這種威脅並實施強大的安全實踐對於保護您的數位資產至關重要。

什麼是現金勒索軟體?

現金勒索軟體是一種特定類型的惡意軟體,以加密受感染設備上的資料並要求贖金進行解密而聞名。該勒索軟體歸因於 Cash RAT(遠端存取木馬)和 MintStealer 背後的相同威脅參與者,表明這是一個組織良好且持續存在的網路犯罪組織。

現金勒索軟體如何運作

一旦在受感染的裝置上激活,現金勒索軟體就會加密檔案並向每個受影響的檔案附加「.CashRansomware」副檔名。例如,“1.doc”變為“1.doc.CashRansomware”,“2.pdf”重新命名為“2.pdf.CashRansomware”。加密過程結束後,勒索軟體會建立三個不同的勒索字條:新的桌面桌布、彈出視窗和名為「Cash Ransomware.html」的 HTML 檔案。

贖金要求和警告

贖金字條雖然不相同,但傳達了相同的關鍵訊息:

  • 文件加密通知。
  • 要求以 Monero (XMR) 加密貨幣支付 80 美元的贖金。
  • 針對重新啟動裝置或執行反惡意軟體程式的警告可能會導致檔案無法解密。
  • 避免與網路斷開連接以確保協商和恢復的說明。

這些註釋也指出,這些檔案是使用高級加密演算法加密的:XChaCha20、Poly1305 和 AES-256-GCM。然而,網路安全專家警告說,支付贖金並不能保證資料恢復,因為網路犯罪分子即使在支付後通常也不會提供解密金鑰。

防止勒索軟體攻擊的最佳安全實踐

防止勒索軟體(包括現金勒索軟體)需要採取積極主動的網路安全方法。以下是用戶應實施的一些最佳實踐,以增強對勒索軟體和其他惡意軟體威脅的防禦:

  • 定期備份:定期將任何重要資料備份到外部磁碟機或雲端儲存。確保備份不會持續連接到網絡,以防止它們在攻擊期間受到損害。
  • 使用強大的反惡意軟體軟體:安裝並維護最新的反惡意軟體軟體。啟用即時掃描和自動更新以防禦最新威脅。
  • 保持軟體更新:確保作業系統、應用程式和軟體始終保持最新狀態,並有最新的可用更新和修補程式。這可以最大限度地減少勒索軟體可以利用的漏洞。
  • 養成安全瀏覽和電子郵件習慣:存取未知來源的連結或下載附件時要小心。網路釣魚電子郵件是眾所周知的勒索軟體傳播媒介。
  • 設定強密碼和多重身份驗證:為不同帳戶使用複雜、唯一的密碼,並盡可能啟用多重身份驗證 (MFA),以增加額外的安全層。
  • 停用 Office 檔案中的巨集:停用從不受信任來源接收的 Microsoft Office 檔案中的巨集,因為這些巨集可用於執行勒索軟體。
  • 教育自己和他人:不斷了解最新的網路威脅,並教育您的家人、朋友和同事了解安全的線上做法和勒索軟體的危險。
  • 現金勒索軟體等勒索軟體威脅的興起凸顯了對警惕和強有力的網路安全措施的迫切需求。透過了解這些威脅的性質並實施最佳安全實踐,使用者可以大幅減少成為勒索軟體攻擊受害者的機會。措施。

    彈出視窗中顯示的贖金字條:

    'Cash RANSOMWARE

    YOUR FILES
    ARE ENCRYPTED
    BY CASH RANSOMWARE

    What happend?

    Dear , We regret to inform you that your files have been compromised by the insidious Cash Ransomware program. This ruthless malware has infiltrated your system, encrypting your precious data and holding it hostage until its demands are met. Below are the chilling details of this dire situation:

    Rapid scanning of your storage drives has been executed, leaving no corner untouched by the malicious claws of Cash Ransomware.
    Utilizing the advanced XChaCha20 encryption algorithm, your files have been ensnared with unbreakable tags and a deadly combination of Poly1305 or AES-256-GCM, meticulously chosen by the ransomware's constructors to ensure maximum devastation.
    To further fortify its grip on your data, Cash Ransomware employs a hybrid bulletproof encryption technique, rendering any attempts at decryption futile against its impenetrable defenses.
    Files bearing specific extensions have been singled out for priority encryption, ensuring that your most critical data is held captive, intensifying the fear and desperation of your predicament.
    As a final blow to any hopes of recovery, Cash Ransomware deploys a double-key encryption mechanism, thwarting any attempts at deception or circumvention, leaving you no recourse but to comply with its demands.
    In light of this harrowing situation, we implore you to refrain from taking any actions that may exacerbate the damage and worsen your plight:

    Do not download antivirus software: Any attempts to combat Cash Ransomware with conventional means will only serve to alert its creators, potentially triggering further encryption or irreversible data loss.
    Do not disconnect from the network: Isolation will not shield you from the relentless reach of Cash Ransomware; instead, it may hinder potential avenues of negotiation or resolution.
    Do not reboot your systems: Restarting your devices could disrupt ongoing encryption processes, rendering your files irretrievable and sealing your fate in the clutches of this merciless malware.
    We understand the gravity of your situation and stand ready to assist you in navigating this crisis. However, time is of the essence, and decisive action is imperative to mitigate the extent of the damage inflicted by Cash Ransomware.

    How to decrypt my files?

    Your files are heavily encrypted, and none can be decrypted without the decryption key.
    To obtain the decryption key, you need to make a payment to the specified amount to the XMR / Monero wallet.
    Once you've made the payment, you should contact the attackers via email or Telegram to receive the decryption key.
    After receiving the decryption key, you need to input it into the decryption panel in Cash.
    Once you hit the decryption button, your files will be decrypted.'

    勒索信以 HTML 文件形式提供:

    'ATTENTION!'ATTENTION!

    YOUR FILES ARE ENCRYPTED BY Cash RANSOMWARE

    Dear user, We regret to inform you that your files have been compromised by the insidious XChaCha20 encryption algorithm, your files have been ensnared with unbreakable tags and a deadly combination of Poly1305 or AES-256-GCM, meticulously chosen by the ransomware's constructors to ensure maximum devastation.
    To further fortify its grip on your data, Cash Ransomware employs a hybrid bulletproof encryption technique, rendering any attempts at decryption futile against its impenetrable defenses.
    Files bearing specific extensions have been singled out for priority encryption, ensuring that your most critical data is held captive, intensifying the fear and desperation of your predicament.
    As a final blow to any hopes of recovery, Cash Ransomware deploys a double-key encryption mechanism, thwarting any attempts at deception or circumvention, leaving you no recourse but to comply with its demands.
    In light of this harrowing situation, we implore you to refrain from taking any actions that may exacerbate the damage and worsen your plight:

    Do not download antivirus software: Any attempts to combat Cash Ransomware with conventional means will only serve to alert its creators, potentially triggering further encryption or irreversible data loss.
    Do not disconnect from the network: Isolation will not shield you from the relentless reach of Cash Ransomware; instead, it may hinder potential avenues of negotiation or resolution.
    Do not reboot your systems: Restarting your devices could disrupt ongoing encryption processes, rendering your files irretrievable and sealing your fate in the clutches of this merciless malware.

    We understand the gravity of your situation and stand ready to assist you in navigating this crisis. However, time is of the essence, and decisive action is imperative to mitigate the extent of the damage inflicted by Cash Ransomware.

    85kCbkZzeaeiSx8h47yFjwUJ8u41FqgbpFbqGp5C93Rpa9eU 7pcYdp5Y7LNSrHkEVmTYa4oCuLeNnHGxVBLH78Uo2XEkXpZ
    Copy Monero

    dolores@bpe.cash
    Copy Email

    80$
    Copy Amount'

    作為桌面背景圖像向受害者顯示的訊息:

    'CASH RANSOMWARE'All computer got infected by Cash Ransomware.
    All your personal files are encrypted
    Using an unique and advanced encryption algorithm.'All computer got infected by Cash Ransomware.
    All your personal files are encrypted
    Using an unique and advanced encryption algorithm.

    If you need your computer or your files
    Please kindly follow steps on the software.
    You can contact people that infected that
    Computer by sending an email
    Please check the Ransomware to get the email.

    Avoid to install an anti-virus, installing a anti-virus
    Will delete the Ransomware without decrypting files.
    Please note that we won't be able to help you
    If you're trying to bypass our system.

    CASHRANSOMWARE'

    熱門

    最受關注

    加載中...