PyCL Ransomware Utilizes RIG Exploit Kit (EK) to spread infection
Last Saturday, security researchers team spotted a new malware detected as PyCL Ransomware. This new ransomware is being delivered through EITest into the RIG Exploit Kit. It is found that this ransom threat was only tested among the system users for one day so it does not perform the encryption process. It may be a test run into the cyber world how does it works. As it uses some similar colors and interface which seems like CTBLocker or Citroni Ransomware. It has been written in different languages and there is no distinguishing strings in the ransom note or executables of this threat. It has been programmed in Python language and the script is known as "cl.py". It seems identical to SADStory or CryPy Ransomware which also uses Python to encryption handle.
PyCL Ransomware delivered through RIG Exploit Kit and EITest
On the detection day of this PyCL Ransomware numerous of security experts noticed that EITest pushed the visitors to RIG Exploit Kit, which is responsible for the distribution of this very ransom virus. This all operation has been controlled via a malicious web domain which reroute the users on the infection spreading agent RIG which then after try to install the vulnerabilities of ransom virus on the users system. The EITest was tested on both PyCL and The Cerber at the same time but this ransom threat distribution has been tested for only one day.
Is PyCL Ransomware is a part of RaaS?
One of the files of this ransom virus contained NSIS installer which is called user.txt. It contain a string of "xkwctmmh" which has been sent to the Command & Control servers during every single request. In addition of this it also uses the same string when the ransomware was being tested by the experts. It clearly states that it is a part of the RaaS where the hackers uses usernames as a the affiliate identifier.
How PyCL Ransomware perform the encryption?
This PyCL Ransomware once got installed on your system then as it uses NSIS installer which has been written in Python language and it is used to encrypt the users data. Then it sends a ransom note and tutorial on how to pay the ransom money. It also connected with C&C servers at every steps of the process in case of debugging or status info to the developers. When it executed the file will be extracted to "%AppData\Roaming\How_Decrypt_My_Files\folder" and the language contents will be extracted into "%AppData%\cl folder". So you should use a strong anti-malware to remove PyCL Ransomware from your system and restore files to run backup.
没有评论:
发表评论