SecneurX Analysts found Cylance Ransomware in the wild. Cylance ransomware encrypts files and appends its extension (".Cylance") to filenames. Also, it drops the "CYLANCE_README.txt" file that contains a ransom note. After executing the Cylance ransomware all files and folders got encrypted and appended their filenames with a ".Cylance" extension. For Example, a file titled "Sep2019.docx" appeared as "Sep2019.docx.Cylance", "Jan2020.docx" as "Jan2020.docx.Cylance", and so on. After Encrypting the files and folders, data is exfiltrated from the compromised system. The data sent to TA's C2 is obfuscated using base64 obfuscation
Screenshot of files encrypted by Cylance ransomware
Cylance Ransomware Overview
In “CYLANCE_README.txt” the Ransomware Recovery note informs victims that all files and folders are encrypted and also informs the victim to send a mail to the mentioned mail address ("Crypter@firemail.de", "Helper@firemail.de") in the ransomware note.
How does ransomware infect my computer?
Malware (ransomware included) is spread using phishing and social engineering tactics. Malicious programs are typically presented as or bundled with ordinary content. Infectious files can be executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on. When a virulent file is executed, run, or otherwise opened - the infection process is jumpstarted.
Screenshots of Cylance Ransomware Note (“CYLANCE_README.txt”)
Ransomware Note (“CYLANCE_README.txt”) in Text
[[=== Cylance Ransomware ===]]
[+] What's happened?
All your files are encrypted, and currently unsable, but you need to follow our instructions. otherwise, you cant return your data (NEVER).
[+] What guarantees?
Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests.
To check the ability of returning files, we decrypt one file for free. That is our guarantee.
If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. time is much more valuable than money.
[+] How to cantact with us?
Please write an email to: Crypter@firemail.de and Helper@firemail.de
!!! DANGER !!!
DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data.
!!! !!! !!!
ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere.
!!! !!! !!!
IOC DETAILS
IP Address
139[.]99[.]233[.]175
URLS
hxxp[:]//139[.]99[.]233[.]175/r1[.]php
SHA256
4021869ff414f091cef498144f6657410cc94cbf85c2b1ddb933bd618eaca765
What can you do to avoid being a ransomware victim?
As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.
Scrutinize emails & their attachments before opening them
Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email.
Avoid clicking embedded links found in unverified emails
Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site.
Back up your important files
While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your own system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media and one of those copies in a separate location.
Regularly update software, programs, and applications
Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrives via vulnerability exploits.
Use a layered protection suite
Doing so can detect threats before they enter your network. Security solutions like SecneurX ATP can block Infectious files (like executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on) by scanning them at the point of entry of the organizations (File uploads, USB file transfers, etc)
Коментарі