Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Waiting (CryTox) Ransomware ([random 9 char].waiting, .wait) Support Topic


  • Please log in to reply
47 replies to this topic

#31 test_account12

test_account12

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:05:33 AM

Posted 08 March 2023 - 07:01 AM

I wanted to know if in this case the hackers actually download the data that is encrypted?

I was reading up about the Cryptox attacks & this looked similar. The cryptox attacks said that they only do 1 of the two: 1. Encrypt Data 2. Download the data. Do you think this would be similar and as they have encrypted the data they wouldn't have downloaded it?



BC AdBot (Login to Remove)

 


#32 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 08 March 2023 - 07:09 AM

When dealing with ransomware, there is no way to know for sure if the cyber-criminals actually steal any of the data, sensitive information or passwords for further criminal activity. In most cases, rather than the content of your data, the criminals are more interested in obtaining a ransom payment for financial gain. These criminals are in business to make money and make it fast, then move on to the next victim. Although some criminals may threaten to release (publish/leak) information if victims do not pay, uploading someone's data for such nefarious purposes is time consuming and could possibly leave a trail for law enforcement authorities to follow. 
 
Nevertheless, there has been an increasing number of malware developers who are stealing files before encrypting them. If the criminals determine the stolen data is sensitive or very valuable, they demand a higher ransom payment and/or threaten to release (publish/leak) the data if a victim does not pay. According to the BlackBerry Research and Intelligence Team, there has been a distinct shift from widespread, indiscriminate distribution to highly targeted campaigns against large corporate, business and governmental agency networks which have enabled the criminals to demand higher ransom payments and threats to publish stolen data.

Another alarming trend involves the exfiltration of data prior to, or during, the ransomware encryption process, enabling attackers to blackmail victims with the threat of sensitive data leakage should they fail to pay in a timely manner...researchers learned that within this group, all of the targeted users who opted not to pay out subsequently had their data released by the threat actors in some way...

Some criminals incorporate a technique whereby the ransomware gets executed days after initial infiltration which allows them to delay encryption and use the extra time to harvest victims' data. Thereafter, the criminals use the stolen data as additional leverage to make victims pay the ransom under the threat of leaking the stolen information. With these increasing threats to leak and publish stolen data, malware developers are demanding a second ransom not to publish stolen files and actually creating sites to leak stolen data.

Even if victims pay the ransom demands, some attackers are following through on extortion threats after the ransom has been paid.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#33 muugii8us

muugii8us

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:33 AM

Posted 11 March 2023 - 07:38 AM

Is somebody have decrypt tool for Ransomware *.WAIT?



#34 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 11 March 2023 - 12:13 PM

@ muugii8us

Does your ransom note look like the one posted in this topic?

What is the actual name of the ransom note? 

 

Do your encrypted files have a [random 9 char ID] ending in a number followed by the .wait extension?

<filename>.png.vqottlor1.wait

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#35 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 13 March 2023 - 06:58 AM

@ test_account12, muugii8us

I have merged your postings and related comments into the primary support topic for victims of this ransomware.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#36 abcuser

abcuser

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:33 AM

Posted 05 July 2024 - 01:29 PM

Last week, we were infected by the same type of ransomware. The files are encrypted and end with a 9-character ID followed by the ".wait" extension. For example, abc.png becomes "abc.png raoifjgna.wait" Additionally, it leaves a message called "help.hta" here is the content of that message:
 

<html><head><meta charset='UTF-8'><title>RECOVERY TOOL</title><HTA:APPLICATION
ICON='msiexec.exe'
SINGLEINSTANCE='yes'
SysMenu='no'>
<script>window.moveTo(50,50);window.resizeTo(screen.width-100,screen.height-100);</script><style type='text/css'>body{background:#000}.b{font:120%;font-weight:bold;color:#fff}.a{background:#f00;border-left:10px}.q{text-align:center;font:200%;font-weight:bold;margin-bottom:20px;color:#fff}</style></head><body><div class='q'>FILES ARE ENCRYPTED</div><div class='b'>All your files were encrypted and important data was copied to our storage</br>If you want to recover files, contact the operator in the TOX application, enter YOUR ID <font color=Lime> raoifjgna</font></br>Add the ID <font color=Blue>BYA3K8ML1Z2W7V9XR5P0Q8NS4T6JD3L7MF1A9G2H0E4U7XK3V1C9T2N5P8W7R0Y4B6M8L1J3D7Q2</font> of your personal operator as a friend so that you can start chatting.</br>If the Operator did not respond within 24 hours or encountered any problem then send an email to our support <font color=Blue>givememony@aol.com</font></br>In the header of the letter, indicate your ID and attach 2-3 infected files to generate a private key and compile the decryptor</br>Files should not have important information and should not exceed the size of more than 5 MB</br>After receiving the ransom, we will send a recovery tool with detailed instructions within an hour and delete your files from our storages</div></br><div class='a'><div class='q'>Attention</div><ul><div class='b'><li>Do not rename encrypted files.</li><li>Do not try to decrypt your data using third party software, it may cause permanent data loss.</li><li>If you refuse to pay the ransom, Important Data that contains personal confidential information or trade secrets will be sold to third parties interested in them.</br>In any case, we will receive a payment, and your company will face problems in law enforcement and judicial areas.</li></div></ul></div><script language='VBScript'>
On Error Resume Next
set S=CreateObject("Wscript.shell")
utox=S.ExpandEnvironmentStrings("%windir%\utox.exe")
If not CreateObject("Scripting.FileSystemObject").FileExists(utox) Then
MsgBox "Find and download UTOX.EXE file on the Internet and start..."
End If
S.Run utox & " -p",1
</script></body></html>


#37 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 06 July 2024 - 07:55 AM

There is nothing new to report that I am aware of.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#38 DvorakPietrek

DvorakPietrek

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:33 PM

Posted 05 February 2025 - 09:12 AM


Hi. I have a problem with my data (it is encrypted to .wait file type).  Can you help me on this?????? Thanks!!!



#39 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 05 February 2025 - 09:26 AM

The criminal's master private key is needed for decryption. Without the criminal's master private key, decryption is impossible.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#40 DvorakPietrek

DvorakPietrek

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:33 PM

Posted 05 February 2025 - 09:51 AM

The criminal's master private key is needed for decryption. Without the criminal's master private key, decryption is impossible

how do I get that key??



#41 DvorakPietrek

DvorakPietrek

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:33 PM

Posted 05 February 2025 - 09:56 AM

 

The criminal's master private key is needed for decryption. Without the criminal's master private key, decryption is impossible

how do I get that key??

 

 



#42 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 05 February 2025 - 10:05 AM

how do I get that key??

You can't without paying the ransom and obtaining the private encryption keys from those who created the ransomware unless they are leaked or seized & released by authorities.
 
Paying the ransom, negotiating with the ransomware developers or using a data recovery service is not advisable as I explain in this topic (Post #17) which includes victim experiences. Also read my comments here (Post #2) for more victim experiences and information as what we know about those who claim they can decrypt data (including scammers, the criminals and data recovery services


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#43 DvorakPietrek

DvorakPietrek

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:33 PM

Posted 06 February 2025 - 07:19 AM

Archive files into a zip archive and only then attach to the message. 

 

attach2.png

 



#44 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:33 PM

Posted 06 February 2025 - 07:41 AM

What is the purpose of the above quoted post by Amigo-A?


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#45 DvorakPietrek

DvorakPietrek

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:33 PM

Posted 06 February 2025 - 09:00 AM

What is the purpose of the above quoted post by Amigo-A?

The purpose?  Because my data is in danger. I own it but can't use it because it is encrypted.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users