Jump to content

Recommended Posts

  • ExTS Admin
Posted

Ransomware found being delivered as Windows critical update

 

http://img.photobucket.com/albums/v708/starbuck50/fantom-ransomware-mimics-windows-update-screen-507668-2_zpsewqwar6x.jpg

 

Ransomware often tries to disguise its malicious behavior by various tricks.

The latest method observed is from a new variant called Fantom, which shows a fake Windows Update screen, while in reality, it's encrypting the user's files.

 

The ransomware, spotted for the first time only a few days ago by AVG security researcher Jakub Kroustek, is coded on top of EDA2, a ransomware building kit that was open-sourced last year, but eventually taken down.

 

EDA2 contained flaws that allowed researchers to obtain the decryption keys from the ransomware's C&C server. According to analysis from Bleeping Computer, those flaws aren't there anymore, meaning one of the Fantom coders must have found and fixed them.

 

Fantom distributed as a fake Windows critical update

 

There are no details on Fantom's distribution.

The method employed by crooks to plant the malicious file on the user's computer can be either via spam email or exploit kits.

 

Either way, the Fantom-infected file is named criticalupdate01.exe, and the crooks are using the "Windows Security Update" lure to fool users into running their malicious file.

 

When this happens, the ransomware springs into action by locking the user's screen and showing fake Windows Update graphics, with a fully- functional percentage-based loading timer, just like on the original Windows Update screen.

 

Don't be fooled by this screen, because it's a trick, and under the hood, Fantom is encrypting your files.

This temporary lock screen can be removed before it reaches 100% by pressing CTRL+F4, but this won't stop the encryption process.

 

http://img.photobucket.com/albums/v708/starbuck50/fantom-ransomware-mimics-windows-update-screen-507668-3_zpsp2fgmdrn.jpg

 

According to MalwareHunterTeam, the ransomware uses classic ransomware encryption by locking files using an AES-128 key, and then encrypting this key with a dual RSA key, with the private key stored on the crook's server, and a public key left on the user's PC.

 

To get the private key and unlock their files, users have to contact the crook by email.

The crook's email addresses are listed in the ransom note, displayed after the encryption process ends.

 

Fantom shows ransom notes in the form of HTML and TXT files, but also changes the user's desktop with a custom screenshot containing the contact details.

 

At the end of all these operations, Fantom cleans after itself by running two batch scripts that delete its installation files.

 

http://img.photobucket.com/albums/v708/starbuck50/fantom-ransomware-mimics-windows-update-screen-507668-4_zpsrnhoyuvz.jpg

 

 

Source:

http://news.softpedia.com/news/fantom-ransomware-mimics-windows-update-screen-507668.shtml

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...