Threat Actor: Unknown | unknown
Victim: Various individuals and businesses | various individuals and businesses
Price: Varies (typically exorbitant ransoms)
Exfiltrated Data Type: Sensitive personal and business data
Key Points :
- 21 new variants of ransomware were detected in August, showcasing the evolving tactics of cybercriminals.
- Ransomware encrypts valuable data, making it inaccessible until a ransom is paid for decryption keys.
- This practice poses significant financial burdens on victims and jeopardizes the integrity of sensitive data.
- Examples of new ransomware include MaxCat, Prince, Blue, Zola, Pomoch, Griffin, and many others.
- Each ransomware variant has unique characteristics, such as different file extensions and SHA-256 hashes.
- Cybersecurity experts are continuously working to identify and mitigate these threats, but detection remains challenging.
In August, cybersecurity experts have identified of 21 new variants of ransomware. These malicious programs, characterized by their insidious nature, pose a significant threat to individuals and businesses alike. With each new variant, cybercriminals are refining their tactics, making detection and mitigation increasingly challenging. Ransomware operates by encrypting valuable data on infected systems, rendering it inaccessible to users. Subsequently, the perpetrators demand exorbitant ransoms for the decryption keys, effectively holding critical information hostage. This nefarious practice not only jeopardizes the integrity of personal and sensitive data but also imposes substantial financial burdens on victims.
- MaxCat
- SHA-256: e420edd7ef3166249a9059ff68922a9a7cbe67da5b02813a14aef183baadcc
- Extensions: .[Four random characters]
- Prince
- SHA-256: c6920ba9bb87871f59814b9bf9083677460dda7dabc2f5f0e88f1cfed00d2eda
- Extensions: .ran
- Blue
- SHA-256: 718a1730a2ba1c4dd162a991e18276bffdda82fecbb9b9b039e4aab30f2358c6
- Extensions: .blue
- Zola
- SHA-256: 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f
- Extensions: .Zola
- Pomoch
- SHA-256: ce746a36f0e85da2b5a1c4ab72c78d048612a9e68968e734d962a071e0c65679
- Extensions: .pomoch45
- Griffin
- SHA-256: 961ea6a0ec374ff52ea5081ccb5c8d59e95524fd185507e86e6129ef00793acd
- Extensions: .griffin
- AttackNew
- SHA-256: 050ca66e8bdf252709ff0e37a9e492f52c41064a35ab5bd9c9a84b2146619b83
- Extensions: .attacknew1
- Hawk Eye
- SHA-256: 68b1cb1f9283b7ff99abc912c4af170992e6744b2c595198f8b3a7bf42e0e4f3
- Extensions: .[Four random characters]
- Allarich
- SHA-256: 5358ff649e3c0b9e6d2a3e4c16d5330f2cc412a7dd2050e1d140433d6c4dd60a
- Extensions: .allarich
- H0rus
- SHA-256: b794e0ec1ff7904a12c9ba322288b435ff6f810b7e2a3329883d5797fa9c5d44
- Extensions: .h0rus13
- Datablack
- SHA-256: 9c6f65782fc31a6f57285259cf881af9ec5a63d34daae86912940c99aa73e14c
- Extensions: .Datablack
- RDanger
- SHA-256: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc
- Extensions: .[unique ID]
- Makop
- SHA-256: f9dcdbe1929dd4606138f9c77b95c144acd4d711fd372f7bb075b8aa61a83b62
- Extensions: .Makop
- Insom
- SHA-256: 7539168dceeb775031aac13a5c983894cc63375649097a617ea7fc389c2e757a
- Extensions: .insom
- Dice
- SHA-256: 65e035d7abaafd2e8b11981292b07f65da440ec739b92dfd3d5d29b46a95c497
- Extensions: .Dice
- Razrusheniye
- SHA-256: 863263e41695ac51bf1eebbb44053d472540c538d221147a3f0d2de5c8632382
- Extensions: .raz
- Pwn3d
- SHA-256: cfba65d57035fe5d39f7fca987d6c0e0369d3457f7e31e8d6818c1da80b912c9
- Extensions: .pwn3d
- ELPACO-team
- SHA-256: 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
- Extensions: .ELPACO-team
- PURGAT0RY
- SHA-256: c5216b896c1c8c20ce45e0003ca6cf44f5ee27b142c5bd9831d3771379b6819d
- Extensions: .PURGAT0RY
- MoneyIsTime
- SHA-256: dd09a2ef31d018fd83f186e3eaaccccdaa8a8c8779ced668abb06dc934d89a2d
- Extensions: .moneyistime
- MoneyIsTime
- SHA-256: dd09a2ef31d018fd83f186e3eaaccccdaa8a8c8779ced668abb06dc934d89a2d
- Extensions: .moneyistime
- BloodForge Onyx
- SHA-256: ! ALERT ! Brand new, there is only announcement
- Extensions: ?
The post 21 New Ransomwares are Detected by Malware Researchers in AUGUST appeared first on Daily Dark Web.