The recent outbreak of a new ransomware has broken the heart for "promotion" of Bitcoin

Source: Shallot Blockchain

The Bitcoin ransomware named DeathRansom almost became a laughing stock in the early days, because the infected users found that the logic of the virus locking the file was very rough, just adding a ".wctc" extension to the original file name , And the user only needs to delete this extension, and the file can be restored to normal use. However, about a week ago, this Bitcoin ransomware virus, which was regarded as a "joke", showed signs of re-emerging. When the infected users wanted to delete the extension, they found that the virus had evolved significantly and was locked. The dead file was completely encrypted without changing its name, and the effects of the ransomware could no longer be eliminated by simple methods.

Since November 20, the number of infected submissions related to "DeathRansom" on the ransomware tagging website has skyrocketed. Although the number of infected submissions declined during the days following the outbreak on November 20, it is worth noting that in the past week, a considerable number of "new victims" have appeared every day As a result, this has alerted the market, as it most likely means that the ransomware is still being actively distributed.

But so far, no security agency has explicitly explained through which channels the ransomware was distributed, or how it spread.

Regarding this question, some netizens found that submission records on the Reddit and ID-Ransomware websites can see that many victims infected by DeathRansom have recently been infected with another ransomware virus STOP Ransomware. Because the STOP virus is distributed only through software bundling, DeathRansom may also be distributed in a similar manner.

Similar to the Bitcoin ransomware that has appeared before, whenever a user is infected by DeathRansom, the virus will delete the system backup and then encrypt all files on the infected computer, not just system files. In addition, the current version of DeathRansom does not add an extension to an encrypted file, but only retains its original name, but the data of the file is encrypted.

Currently the only way to identify that a file has been encrypted by DeathRansom is that the ABEFCDAB code will appear at the end of the string of the encrypted file.

In each folder where the encrypted files are located, the ransomware creates a document named read_me.txt containing the unique "LOCK-ID" of the infected computer and an email to contact the ransomware developer or agency address. Currently, security companies have started analyzing this ransomware, but so far no company or team has announced how to find or publish decryption methods.

"Interesting" is that in order to ensure that "victims" can successfully pay Bitcoins, the documents created by the ransomware will also contain instructions on how to buy Bitcoins, as well as links to LocalBitcoins, a cryptocurrency OTC platform, and even Link to a popular science article on Bitcoin published by Coindesk. In this regard, some netizens joked that the production team of the DeathRansom virus can be called the "industry conscience" to promote Bitcoin.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

IMF urges Philippine central bank to collect crypto exchange transaction data and use data for macroeconomic analysis

According to Cointelegraph reported on January 2, the International Monetary Fund (IMF) urged the Philippine Central ...

Blockchain

When the PoS gold rush era is opened, who will become the next bit continent?

background The first generation of cryptocurrency bitcoin, which brought the necessary changes to our world, and the ...

Blockchain

A picture of the stolen Bitcoin exchange in the past years

This infographic is mainly to summarize the past money currency exchanges and then display them in a visual form. The...

Opinion

a16z evaluates the regulation of Web3 in the United States The regulatory situation is much more optimistic

This article analyzes and rates cases involving Coinbase, Uniswap, ZeroEx, OPYN, and Deridex, and finds that the regu...

Blockchain

Alameda Research's $200M Blow A Tale of Phishing Attacks and Poor Security Practices, as Confessed by Ex-FTX Engineer

Aditya Baradwaj has revealed that a file containing blockchain private keys and exchange API keys was left vulnerable...

DeFi

White Paper's publication has reached its 15th year, how has the Bitcoin ecosystem evolved?

In the world of encryption, a document's status is equivalent to the Bible and the Declaration of Independence. It is...