31 New Ransomwares Detected in September

Threat Actor: Unknown | Unknown
Victim: Various individuals and businesses | Various individuals and businesses
Price: Varies (typically exorbitant)
Exfiltrated Data Type: Encrypted files, sensitive data

Key Points :

  • In September, 31 new ransomware variants were detected, increasing the threat landscape.
  • Ransomware encrypts valuable data, making it inaccessible to users.
  • Perpetrators demand high ransoms for decryption keys, holding data hostage.
  • Each new variant showcases refined tactics by cybercriminals, complicating detection and mitigation.
  • The financial burden on victims can be substantial, affecting both individuals and businesses.
  • Ownerd
    • SHA-256: 519a765a3341b03a035d158605eef4620e1094f0e3d1e7be1d1ac4750f2a0552
    • Extensions: .ownerd
  • C*nt
    • SHA-256: 6ba031f690998d8df34941e7fd7d2cbf5062fd790004fd7fb53018981635af8a
    • Extensions: .c*nt
  • Cicada
    • SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
    • Extensions: .[seven random characters]
  • Luxy
    • SHA-256: a2bc9b467f331a26b33cfd70f7bf12c9e2e6b3ebc8d3749c12a7eedf507e9323
    • Extensions: .luxy
  • Ior
    • SHA-256: ce371f9f9c2446ca5d84e5df4bd8562247c198310b81e577fa4afc2398795438
    • Extensions: .ior
  • XiN
    • SHA-256: d46c1ee87e485def61ed2b63d47562e1b70fa4e1812eec2975c5aa1fd067f962
    • Extensions: .XiN
  • Trial_recovery
    • SHA-256: b0dfaf509de38749c49afcb3cd34d27126044bb77cc16896b02ebced6f95db02
    • Extensions: .random_string
  • Hlas
    • SHA-256: 8e0af41e4df32ae3ff4b55cc8f8aedb389edb886dc65d577a5ac92aeda4a3039
    • Extensions: .hlas
  • Colony
    • SHA-256: d940c011420b9813374d2cdb2444c1b52d3b8e82401c61a948b97955ec4bcf50
    • Extensions: .colony96
  • ScRansom
    • SHA-256: 34e2b621f15ad4747c7e3dde2be3617841ffacba203b93fd2ff3256b914240f7
    • Extensions: .Encrypted
  • blackZluk
    • SHA-256: ecc6369f4bf0bc1d0ad9e7afba34c21f4614641ecff396911817829b534cb1d8
    • Extensions: .blackZluk
  • Bixi
    • SHA-256: c7ab0862d5077734132f898e6a653cfca4f9767c78d43e15443991e561e4b065
    • Extensions: .bixi
  • Terminator
    • SHA-256: 58eac9e52013d35e2d6fa053ad87adf853735a962eb40f13fdd092f4f4ca2135
    • Extensions: .terminator
  • Cipher
    • SHA-256: 343716187ae7a3dcd6ebb8677335b9ca43f6552225c505156352d86e44488d33
    • Extensions: .cipher
  • Crypto24
    • SHA-256: f9dcdbe1929dd4606138f9c77b95c144acd4d711fd372f7bb075b8aa61a83b62
    • Extensions: .crypto24
  • Pgp
    • SHA-256: 3a311679a57eabb27cb3aa62ad10a98403ed1ad705f9c519372099ec715b21bb
    • Extensions: .pgp[ID]
  • RedRose
    • SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
    • Extensions: .RedRose
  • ZAKI ESCOVINDA
    • SHA-256: c9fd70150bd8c6e36dd821846464e974b6d5e5c77992d6b7973fcefd5c133814
    • Extensions: .escovinda
  • Mqpoa
    • SHA-256: 4948a38883a9d1732ec690e720bdf5301394fc4a26f5d76e4c88198af7772676
    • Extensions: .mqpoa
  • Foxtrot
    • SHA-256: 603bde10ac6c12040d56127ef2f7accb0dd6b927020dc4218382964afb379f9f
    • Extensions: .foxtrot70
  • Tyson
    • SHA-256: 1aeea420fd7ad08f55a074277be26a36a98959a78da830c5ad6cee38c002cdf6
    • Extensions: .tyson
  • In September, cybersecurity experts have identified of 31 new variants of ransomware. These malicious programs, characterized by their insidious nature, pose a significant threat to individuals and businesses alike. With each new variant, cybercriminals are refining their tactics, making detection and mitigation increasingly challenging. Ransomware operates by encrypting valuable data on infected systems, rendering it inaccessible to users. Subsequently, the perpetrators demand exorbitant ransoms for the decryption keys, effectively holding critical information hostage. This nefarious practice not only jeopardizes the integrity of personal and sensitive data but also imposes substantial financial burdens on victims.

    • Ownerd
      • SHA-256: 519a765a3341b03a035d158605eef4620e1094f0e3d1e7be1d1ac4750f2a0552
      • Extensions: .ownerd
    • C*nt
      • SHA-256: 6ba031f690998d8df34941e7fd7d2cbf5062fd790004fd7fb53018981635af8a
      • Extensions: .c*nt
    • Cicada
      • SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
      • Extensions: .[seven random characters]
    • Luxy
      • SHA-256: a2bc9b467f331a26b33cfd70f7bf12c9e2e6b3ebc8d3749c12a7eedf507e9323
      • Extensions: .luxy
    • Ior
      • SHA-256: ce371f9f9c2446ca5d84e5df4bd8562247c198310b81e577fa4afc2398795438
      • Extensions: .ior
    • XiN
      • SHA-256: d46c1ee87e485def61ed2b63d47562e1b70fa4e1812eec2975c5aa1fd067f962
      • Extensions: .XiN
    • Trial_recovery
      • SHA-256: b0dfaf509de38749c49afcb3cd34d27126044bb77cc16896b02ebced6f95db02
      • Extensions: .random_string
    • Hlas
      • SHA-256: 8e0af41e4df32ae3ff4b55cc8f8aedb389edb886dc65d577a5ac92aeda4a3039
      • Extensions: .hlas
    • Colony
      • SHA-256: d940c011420b9813374d2cdb2444c1b52d3b8e82401c61a948b97955ec4bcf50
      • Extensions: .colony96
    • ScRansom
      • SHA-256: 34e2b621f15ad4747c7e3dde2be3617841ffacba203b93fd2ff3256b914240f7
      • Extensions: .Encrypted
    • blackZluk
      • SHA-256: ecc6369f4bf0bc1d0ad9e7afba34c21f4614641ecff396911817829b534cb1d8
      • Extensions: .blackZluk
    • Bixi
      • SHA-256: c7ab0862d5077734132f898e6a653cfca4f9767c78d43e15443991e561e4b065
      • Extensions: .bixi
    • Terminator
      • SHA-256: 58eac9e52013d35e2d6fa053ad87adf853735a962eb40f13fdd092f4f4ca2135
      • Extensions: .terminator
    • Cipher
      • SHA-256: 343716187ae7a3dcd6ebb8677335b9ca43f6552225c505156352d86e44488d33
      • Extensions: .cipher
    • Crypto24
      • SHA-256: f9dcdbe1929dd4606138f9c77b95c144acd4d711fd372f7bb075b8aa61a83b62
      • Extensions: .crypto24
    • Pgp
      • SHA-256: 3a311679a57eabb27cb3aa62ad10a98403ed1ad705f9c519372099ec715b21bb
      • Extensions: .pgp[ID]
    • RedRose
      • SHA-256: 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
      • Extensions: .RedRose
    • ZAKI ESCOVINDA
      • SHA-256: c9fd70150bd8c6e36dd821846464e974b6d5e5c77992d6b7973fcefd5c133814
      • Extensions: .escovinda
    • Mqpoa
      • SHA-256: 4948a38883a9d1732ec690e720bdf5301394fc4a26f5d76e4c88198af7772676
      • Extensions: .mqpoa
    • Foxtrot
      • SHA-256: 603bde10ac6c12040d56127ef2f7accb0dd6b927020dc4218382964afb379f9f
      • Extensions: .foxtrot70
    • Tyson
      • SHA-256: 1aeea420fd7ad08f55a074277be26a36a98959a78da830c5ad6cee38c002cdf6
      • Extensions: .tyson
    • Secdojo
      • SHA-256: e873aa7deaf0889e7131a27d2fed14aedb7ec39df8dc20c150633482d6c59837
      • Extensions: .secdojo
    • RDP
      • SHA-256: 24893dc83648dac9acf101c38381fbe5f09dff7788e4cd1d9ac6fc10bde8bb7a
      • Extensions: .encrypted
    • Crystal Rans0m
      • SHA-256: 15219aa22db99f064c47c224a205cdd3ed438dabd2d2593242ed2882e6458311
      • Extensions: .Crystal
    • Shadaloo
      • SHA-256: 5f71dd1c8d2794eac06a4720d560d1185ace4344862aabfbb812316df473cba6
      • Extensions: .shadaloo
    • Dark Eye
      • SHA-256: 747c9df4dfe35d48e885beba9d91e33c7db1ab6b90a2c38b978bbe9705143af5
      • Extensions: .darkeye
    • NoDeep
      • SHA-256: f3a8977055607904541393aeb87b9ed085b3ea150f56b2b8505c8e70663522ed
      • Extensions: .nodeep
    • DennisTheHitman
      • SHA-256: 87a9cf743545b76277e88442e784f0dda6701fb10abfba6c0adc75feaec3de28
      • Extensions: .247_dennisthehitman
    • The Bully
      • SHA-256: 48ac83784322b01e7da5cf98a907f4197679dfbb571b8babfd67307ccdb978bf
      • Extensions: .HAHAHAIAMABULLY
    • Defi
      • SHA-256: 3664ff8050ccf9e6d73e197f43e23422dcc5bd738c4c5d90808370bc6dba7868
      • Extensions: .defi[ID]
    • King
      • SHA-256: 4cb5ccdd7da2fd74167fc91195e29050beeea2c8bef66fa9905267791cc75ded
      • Extensions: .king

     

    The post 31 New Ransomwares are Detected by Malware Researchers in SEPTEMBER appeared first on Daily Dark Web.