Zuhause » Nachrichten » Forscher sagen, über die wachsende Aktivität von TFlower, eine andere Ransomware, die RDP verwendet

Forscher sagen, über die wachsende Aktivität von TFlower, eine andere Ransomware, die RDP verwendet

Nach Bleeping-Computer, die Aktivität von TFlower, eine Ransomware, die RDP und konzentriert sich auf Unternehmensnetzwerke verwendet, hat damit begonnen, an Dynamik zu gewinnen.

The malware arrived in late July and installs into the system after a hacker attack aimed gaining access to the Remote Desktop service.

“With the huge payments being earned by ransomware developers as they target businesses and government agencies, it is not surprising to see new ransomware being developed to take advantage of this surge in high ransoms. Such is the case with the TFlower ransomware”, - Bericht Bleeping Computer journalists.

Zur Zeit, TFlower is distributed to victims as a chilli.exe file and encrypts data using the AES algorithm in CBC mode. It also able to remove shadow copies of Windows, disable the recovery tools for Windows 10 and force shut down the Outlook.exe process to get to its files.

The malware encryption process displays in the console; and having started this task, it connects to the control center and updates his status. Searching and converting the victim’s files, TFlower bypasses the Windows folder and the “Samples of music” (Standort – C:\Users\Public\Public Music\Sample Music).

The rookie does not have his own extension for encrypted files, he only adds the *tflower token and the encryption key to them. After completing its work, the malware reports this to the C&C-Server, and on the infected machine messages appear asking for ransom !_Notice_!.TXTin all folders with modified files and on the desktop.

For instructions on recovering files, ransomware offers to contact them by email using @protonmail.com or @tutanota.com.

LESEN  .MERS Ransomware

When TFlower debuted, its overlords charged 15 bitcoins per decryption key. Since the end of August, they ceased to indicate the size of the ransom in their messages. It is currently impossible to return files without paying a ransom: analysts are studying malicious code, but have not yet discovered vulnerabilities in the encryption system.

Internet-accessible RDP services as an attack vector are very popular with distributors of encryption programs targeting corporate environment. samsam, Scarabey, Matrix, Dharma and Nemty dieses Jahr, used a similar method of infection.

[Gesamt:0    Durchschnitt: 0/5]

Über Trojan Mörder

Tragen Sie Trojan Killer-Portable auf Ihrem Memory-Stick. Achten Sie darauf, dass Sie in der Lage sind, Ihr PC keine Cyber-Bedrohungen widerstehen zu helfen, wo immer Sie sind.

überprüfen Sie auch

ERosary Smart Rosenkranz Anfälligkeiten

Forscher fanden heraus, Schwachstellen in eRosary Smart Rosenkranz von Vatikan-Entwickler

Forscher fanden heraus, Schwachstellen im eRosary Smart Rosenkranz, die hatten die Vatikan-Entwickler zuvor eingeführt. …

Entfernen Werd Virus Ransomware (+Wiederherstellung von Dateien)

Inhaltsverzeichnis über WerdDo NICHT Geld schicken für Entschlüsselung von “war” Dateien!So schützen …

Hinterlasse eine Antwort