Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


"When Paying Out Doesn't Pay Off", via Cisco Talos Blog

  • Please log in to reply
2 replies to this topic

#1 Aura


    Bleepin' Special Ops

  • Malware Response Team
  • 19,298 posts
  • Gender:Male
  • Local time:07:53 PM

Posted 13 July 2016 - 10:55 AM

Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of this business model. As a result, greater numbers of unique ransomware families are emerging at a faster rate. This sometimes results in complex variants emerging or in other cases, like this one, less sophisticated ones. In many cases these new ransomware threats share little resemblance to some of the more established operations in their approach to infecting systems, encrypting/removing files, or the way in which they attempt to coerce victims into complying with their ransom demands.

Source: http://blog.talosintel.com/2016/07/ranscam.html#more

I have no words for this.

Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.

BC AdBot (Login to Remove)



#2 Gorbulan


  • Members
  • 832 posts
  • Local time:03:53 PM

Posted 13 July 2016 - 11:52 AM

Just read about it on TheRegister. Kinda surprised it took this long for this type of ransomware to appear.

#3 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 50,733 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:53 PM

Posted 13 July 2016 - 03:03 PM

The author is simply relying on “smoke and mirrors” in an attempt to convince victims that their files can be recovered in hopes that they will choose to pay the ransom.

Not just smoke and mirrors but on scare tactics and victims with little knowledge about malware infections.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users