"Double-crossing ransomware decryptor scrambles your files again!"

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Locked
User avatar
OneCD
Guru
Posts: 12144
Joined: Sun Aug 21, 2016 10:48 am
Location: "... there, behind that sofa!"

"Double-crossing ransomware decryptor scrambles your files again!"

Post by OneCD »

Not NAS-specific, but something to bear-in-mind when dealing with a ransomware infection. :wink:

https://nakedsecurity.sophos.com/2020/0 ... les-again/
Paul Ducklin wrote:Here’s one for the books: ransomware that’s disguised as a free anti-ransomware decryption tool.

The sample we looked at claims to be a decryptor for the DJVU ransomware, which gets its name from the .djvu extension it appends to files that it’s just scrambled.

You’re invited to put in your “personal ID” and a file extension, presumably to give the program a veneer of legitimacy, but as far as we can see it ignores what you enter, using the dialog simply as a launcher for the encryptor-within-the-bogus-decryptor.

If fact, the fake decryptor simply extracts a copy of another program called crab.exe (not to be confused with the GandCrab ransomware family) that’s embedded inside it as a data resource.

The fake decryptor writes crab.exe to your TEMP folder, launches it and then deletes itself.

The crab.exe file is unreconstructed ransomware: it goes through your files looking for matches against a long list of file extensions to encrypt, and scrambles them with a randomly-chosen encryption key.

The extension .djvu, added by the very ransomware that this double-crossing malware claims to be able to fix, is on the list.

So if you are running this in the desperate hope that you might be able to recover from one ransomware attack for for free…

…you’ll end up in a double-whammy situation, with any files that DJVU didn’t yet attack scrambled once, and with any already-encrypted files now scrambled twice.

This malware uses the extension .ZRB, so doubly-encrypted files will now end .djvu.ZRB

After the scrambling finishes, your Windows wallpaper is set to a black background for dramatic effect, and a file called --DECRYPT--ZORAB.txt is added to your desktop to tell you what to do next:

Image

There’s no price shown here, no web page to visit, and no cryptocoin wallet to send any funds to, just a “personal ID” and a pseudo-anonymous Protonmail email address that supposedly puts you in touch with the crooks.

Note that by simply changing a few text strings in their malware and recompiling it, these crooks could easily turn it into a variant that claims to “fix” other ransomware strains – it’s just the window title and the .djvu extension string that target this sample at DJVU victims.

We’re guessing that DJVU was targeted this time because early versions of that malware could be decrypted for free, but it seems that the DJVU crooks made some recent “improvements” to make it harder to unscramble without paying.

As a result, we assume that at least some victims might now be willing to search outside their usual comfort zone for free tools that claim to help, given that the reputable ones they’ve already tried didn’t work.

For what it’s worth, the crab.exe scrambler didn’t seem very well programmed – in our tests it failed to scramble some files for reasons that could easily be avoided (we shan’t say why- we’ll leave the crooks to find the bug for themselves), and in some directories it managed to scramble its own --DECRYPT--ZORAB.txt ransom note shortly after creating it.

ImageImageImageImageImageImageImageImageImageImageImageImageImageImageImageImageImageImage
dragonslayer
New here
Posts: 2
Joined: Mon Apr 27, 2020 8:09 pm

Re: "Double-crossing ransomware decryptor scrambles your files again!"

Post by dragonslayer »

Ransomware scrambling its own ransom note! :-0

Tragicomic! Tragic that a victim is lured into another trap! Comic in the sense the crooks are bumbling ** and people keep getting fooled.
Locked

Return to “Users' Corner”