Threat Actor: Unknown | Unknown
Victim: Various individuals and businesses | Various individuals and businesses
Price: Varies (typically exorbitant)
Exfiltrated Data Type: Encrypted files, sensitive data
Key Points :
- In September, 31 new ransomware variants were detected, increasing the threat landscape.
- Ransomware encrypts valuable data, making it inaccessible to users.
- Perpetrators demand high ransoms for decryption keys, holding data hostage.
- Each new variant showcases refined tactics by cybercriminals, complicating detection and mitigation.
- The financial burden on victims can be substantial, affecting both individuals and businesses.
- Ownerd
- SHA-256: 519a765a3341b03a035d158605eef4620e1094f0e3d1e7be1d1ac4750f2a0552
- Extensions: .ownerd
- C*nt
- SHA-256: 6ba031f690998d8df34941e7fd7d2cbf5062fd790004fd7fb53018981635af8a
- Extensions: .c*nt
- Cicada
- SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
- Extensions: .[seven random characters]
- Luxy
- SHA-256: a2bc9b467f331a26b33cfd70f7bf12c9e2e6b3ebc8d3749c12a7eedf507e9323
- Extensions: .luxy
- Ior
- SHA-256: ce371f9f9c2446ca5d84e5df4bd8562247c198310b81e577fa4afc2398795438
- Extensions: .ior
- XiN
- SHA-256: d46c1ee87e485def61ed2b63d47562e1b70fa4e1812eec2975c5aa1fd067f962
- Extensions: .XiN
- Trial_recovery
- SHA-256: b0dfaf509de38749c49afcb3cd34d27126044bb77cc16896b02ebced6f95db02
- Extensions: .random_string
- Hlas
- SHA-256: 8e0af41e4df32ae3ff4b55cc8f8aedb389edb886dc65d577a5ac92aeda4a3039
- Extensions: .hlas
- Colony
- SHA-256: d940c011420b9813374d2cdb2444c1b52d3b8e82401c61a948b97955ec4bcf50
- Extensions: .colony96
- ScRansom
- SHA-256: 34e2b621f15ad4747c7e3dde2be3617841ffacba203b93fd2ff3256b914240f7
- Extensions: .Encrypted
- blackZluk
- SHA-256: ecc6369f4bf0bc1d0ad9e7afba34c21f4614641ecff396911817829b534cb1d8
- Extensions: .blackZluk
- Bixi
- SHA-256: c7ab0862d5077734132f898e6a653cfca4f9767c78d43e15443991e561e4b065
- Extensions: .bixi
- Terminator
- SHA-256: 58eac9e52013d35e2d6fa053ad87adf853735a962eb40f13fdd092f4f4ca2135
- Extensions: .terminator
- Cipher
- SHA-256: 343716187ae7a3dcd6ebb8677335b9ca43f6552225c505156352d86e44488d33
- Extensions: .cipher
- Crypto24
- SHA-256: f9dcdbe1929dd4606138f9c77b95c144acd4d711fd372f7bb075b8aa61a83b62
- Extensions: .crypto24
- Pgp
- SHA-256: 3a311679a57eabb27cb3aa62ad10a98403ed1ad705f9c519372099ec715b21bb
- Extensions: .pgp[ID]
- RedRose
- SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
- Extensions: .RedRose
- ZAKI ESCOVINDA
- SHA-256: c9fd70150bd8c6e36dd821846464e974b6d5e5c77992d6b7973fcefd5c133814
- Extensions: .escovinda
- Mqpoa
- SHA-256: 4948a38883a9d1732ec690e720bdf5301394fc4a26f5d76e4c88198af7772676
- Extensions: .mqpoa
- Foxtrot
- SHA-256: 603bde10ac6c12040d56127ef2f7accb0dd6b927020dc4218382964afb379f9f
- Extensions: .foxtrot70
- Tyson
- SHA-256: 1aeea420fd7ad08f55a074277be26a36a98959a78da830c5ad6cee38c002cdf6
- Extensions: .tyson
- In September, cybersecurity experts have identified of 31 new variants of ransomware. These malicious programs, characterized by their insidious nature, pose a significant threat to individuals and businesses alike. With each new variant, cybercriminals are refining their tactics, making detection and mitigation increasingly challenging. Ransomware operates by encrypting valuable data on infected systems, rendering it inaccessible to users. Subsequently, the perpetrators demand exorbitant ransoms for the decryption keys, effectively holding critical information hostage. This nefarious practice not only jeopardizes the integrity of personal and sensitive data but also imposes substantial financial burdens on victims.
- Ownerd
- SHA-256: 519a765a3341b03a035d158605eef4620e1094f0e3d1e7be1d1ac4750f2a0552
- Extensions: .ownerd
- C*nt
- SHA-256: 6ba031f690998d8df34941e7fd7d2cbf5062fd790004fd7fb53018981635af8a
- Extensions: .c*nt
- Cicada
- SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
- Extensions: .[seven random characters]
- Luxy
- SHA-256: a2bc9b467f331a26b33cfd70f7bf12c9e2e6b3ebc8d3749c12a7eedf507e9323
- Extensions: .luxy
- Ior
- SHA-256: ce371f9f9c2446ca5d84e5df4bd8562247c198310b81e577fa4afc2398795438
- Extensions: .ior
- XiN
- SHA-256: d46c1ee87e485def61ed2b63d47562e1b70fa4e1812eec2975c5aa1fd067f962
- Extensions: .XiN
- Trial_recovery
- SHA-256: b0dfaf509de38749c49afcb3cd34d27126044bb77cc16896b02ebced6f95db02
- Extensions: .random_string
- Hlas
- SHA-256: 8e0af41e4df32ae3ff4b55cc8f8aedb389edb886dc65d577a5ac92aeda4a3039
- Extensions: .hlas
- Colony
- SHA-256: d940c011420b9813374d2cdb2444c1b52d3b8e82401c61a948b97955ec4bcf50
- Extensions: .colony96
- ScRansom
- SHA-256: 34e2b621f15ad4747c7e3dde2be3617841ffacba203b93fd2ff3256b914240f7
- Extensions: .Encrypted
- blackZluk
- SHA-256: ecc6369f4bf0bc1d0ad9e7afba34c21f4614641ecff396911817829b534cb1d8
- Extensions: .blackZluk
- Bixi
- SHA-256: c7ab0862d5077734132f898e6a653cfca4f9767c78d43e15443991e561e4b065
- Extensions: .bixi
- Terminator
- SHA-256: 58eac9e52013d35e2d6fa053ad87adf853735a962eb40f13fdd092f4f4ca2135
- Extensions: .terminator
- Cipher
- SHA-256: 343716187ae7a3dcd6ebb8677335b9ca43f6552225c505156352d86e44488d33
- Extensions: .cipher
- Crypto24
- SHA-256: f9dcdbe1929dd4606138f9c77b95c144acd4d711fd372f7bb075b8aa61a83b62
- Extensions: .crypto24
- Pgp
- SHA-256: 3a311679a57eabb27cb3aa62ad10a98403ed1ad705f9c519372099ec715b21bb
- Extensions: .pgp[ID]
- RedRose
- SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
- Extensions: .RedRose
- ZAKI ESCOVINDA
- SHA-256: c9fd70150bd8c6e36dd821846464e974b6d5e5c77992d6b7973fcefd5c133814
- Extensions: .escovinda
- Mqpoa
- SHA-256: 4948a38883a9d1732ec690e720bdf5301394fc4a26f5d76e4c88198af7772676
- Extensions: .mqpoa
- Foxtrot
- SHA-256: 603bde10ac6c12040d56127ef2f7accb0dd6b927020dc4218382964afb379f9f
- Extensions: .foxtrot70
- Tyson
- SHA-256: 1aeea420fd7ad08f55a074277be26a36a98959a78da830c5ad6cee38c002cdf6
- Extensions: .tyson
- Secdojo
- SHA-256: e873aa7deaf0889e7131a27d2fed14aedb7ec39df8dc20c150633482d6c59837
- Extensions: .secdojo
- RDP
- SHA-256: 24893dc83648dac9acf101c38381fbe5f09dff7788e4cd1d9ac6fc10bde8bb7a
- Extensions: .encrypted
- Crystal Rans0m
- SHA-256: 15219aa22db99f064c47c224a205cdd3ed438dabd2d2593242ed2882e6458311
- Extensions: .Crystal
- Shadaloo
- SHA-256: 5f71dd1c8d2794eac06a4720d560d1185ace4344862aabfbb812316df473cba6
- Extensions: .shadaloo
- Dark Eye
- SHA-256: 747c9df4dfe35d48e885beba9d91e33c7db1ab6b90a2c38b978bbe9705143af5
- Extensions: .darkeye
- NoDeep
- SHA-256: f3a8977055607904541393aeb87b9ed085b3ea150f56b2b8505c8e70663522ed
- Extensions: .nodeep
- DennisTheHitman
- SHA-256: 87a9cf743545b76277e88442e784f0dda6701fb10abfba6c0adc75feaec3de28
- Extensions: .247_dennisthehitman
- The Bully
- SHA-256: 48ac83784322b01e7da5cf98a907f4197679dfbb571b8babfd67307ccdb978bf
- Extensions: .HAHAHAIAMABULLY
- Defi
- SHA-256: 3664ff8050ccf9e6d73e197f43e23422dcc5bd738c4c5d90808370bc6dba7868
- Extensions: .defi[ID]
- King
- SHA-256: 4cb5ccdd7da2fd74167fc91195e29050beeea2c8bef66fa9905267791cc75ded
- Extensions: .king
The post 31 New Ransomwares are Detected by Malware Researchers in SEPTEMBER appeared first on Daily Dark Web.
- Ownerd