Ransomware “Shade” is on tour on North America

In the first quarter this year, experts from Palo Alto Networks noted 6536 attempts to download cryptographer Share in their client’s base. About one-third of dangerous requests came from US computers.

Windows-ransomware Shade, also known as Troldesh, arrived on the Internet at the end of 2014 – beginning of 2015. It is spread majorly from spam, and sometimes – with the use of exploit-packs.

For coordination of data, malware creates 256-bites AES keys, and, saving them in the final file, encrypts them with RSA-3072 key. In every folder with encrypted files and on the desktop is placed up to 10 identical README.txt documents with instructions in English and Russian. After work is finished, Shade deletes all shadow files’ copies on all disks.

Shade Infected Desktop Background
Shade Infected Desktop Background

During the time of its existence, cryptographer also demonstrated some other skills, as cheating clicks on advertising banner and downloading additional malware (Pony, Teamspy, banking Trojans).

Free decoder for Shade created long time ago and no available on No More Ransome project’s website, however, practice says that malware operators still hope to collect tribute from inattentive users with its help.

Spam messages that are still spread for its sowing, mostly target Russian-speaking public, and among victims are listed Russia, Japan, Germany, France and Ukraine citizens. At the end of 2016 was fixed targeting mailing in Australia.

According to Palo Alto, between January and March 2019 malware tour’s geography significantly changed:

  • US – 2010 appeals;
  • Japan- 1677;
  • India – 989;
  • Thailand – 723;
  • Canada – 712;
  • Spain- 505;
  • Russia – 86;
  • France – 71;
  • UK- 67;
  • Kazakhstan – 21.

Most often Shade tried to upload representatives of IT-industry, commercial and educational institutions.

  • IT-technology – 5009 appeals;
  • Trade – 722;
  • Education – 720;
  • Telecommunications – 311;
  • Finances – 51;
  • Transport and logistics – 24;
  • Industrial enterprises – 32;
  • Professional services (legal assistance) 8;
  • Utilities and energy – 4;
  • Local administration – 1.

Experts emphasize that data was collected in company’s clients’ base, so lists cannot claim to cover full auditory of current attacks.

Infection Chain of Shade Ransomware
Infection Chain of Shade Ransomware

In total researchers accounted 307 Shade samples that spread in frames of new campaign. Analyses demonstrated that extortionist’s identifying marks remained the same.

So, it still added to the encrypted files .crypted000007 extension, that was firstly noted in April 2017 (in 2015-2016 Shade authors often changed this attachment, but later experiments stopped). Message with the demand of buyout is displayed on the screen unchanged during the entire existence of the malware, and the onion-domain for receiving payments has not changed since 2016.

Source: https://gbhackers.com

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

MageCart on the Heroku Cloud Platform

Researchers Found Several MageCart Web Skimmers On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform …

Android Spyware CallerSpy

CallerSpy spyware masks as an Android chat application

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, …

Leave a Reply