Old ! but still not cleaned :'(
-
-
Is the infection vector for this one known?
1 reply 0 retweets 0 likes -
Replying to @bartblaze @benkow_
I only saw it on server with rdp and with backdoored website... So difficult to be sure but I would say 'via rdp'
1 reply 0 retweets 0 likes -
Sounds very plausible, added to the ransomware overview. These ones are harder to track the origin from.
1 reply 0 retweets 0 likes -
Replying to @bartblaze @benkow_
but it is "an old" ransomware, first view was in 2k13, (they did some change since, but without sample, I can't be sure)
1 reply 0 retweets 0 likes -
Yep, quite a lot of mentions on Russian forums, but very hard to track a sample :( Thanks mate!
1 reply 0 retweets 0 likes -
Replying to @bartblaze @F_kZ_
I vote for RDP/VNC bruteforce for vector. For a sample, check: https://www.virustotal.com/en/file/5f62090baf4012f9d93aa7948a09f777d739138c23b58928b4e11274e3d78ba1/analysis/ …
1 reply 1 retweet 3 likes -
Replying to @benkow_ @bartblaze
Looks like a decoder, not the ransomware :/
1 reply 0 retweets 0 likes -
-
Replying to @benkow_ @bartblaze
Honnestly I think it has a self-remove part, so we can't find it after infection (and it is something logical for me)
2 replies 0 retweets 0 likes
Makes sense. At one point, we'll catch it, I'm sure :)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.