top of page
  • SecneurX Threat Analysis

What is Lucknite Ransomware ?


Secneurx Analyst found Lucknite ransomware in the wild and analyzed the sample. Lucknight ransomware encrypts files and appends its extension (".lucknite") to filenames. Also, it drops the "README.txt" file that contains a ransom note. After executing the lucknite ransomware all files and folders got encrypted and appended their filenames with a ".lucknite" extension. For Example a file titled as "Sep2019.docx" appeared as "Sep2019.docx.lucknite", "Jan2020.docx" as "Jan2020.docx.lucknite", and so on.

Screenshot of files encrypted by Lucknite ransomware



Lucknite Ransomware Overview

Lucknite ransomware notes inform victims that their files have been encrypted. It instructs victims to purchase the decrypt tool for $50 in Ethereum to decrypt all files and folders and also mentioned an Ethereum wallet address in README.txt.


How does ransomware infect my computer?


Malware (ransomware included) is spread using phishing and social engineering tactics. Malicious programs are typically presented as or bundled with ordinary content. Infectious files can be executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on. When a virulent file is executed, run, or otherwise opened - the infection process is jumpstarted.

Screenshot of Lucknite Ransomware Text file (“README.txt")



Translated _readme.txt

 

All of your files have been encrypted by Lucknite ransomware.

Your computer was infected with a ransomware virus. Your files have been encrypted and you won't

be able to decrypt them without our help. What can I do to get my files back? You can buy our special

decryption software, this software will allow you to recover all of your data and remove the

ransomware from your computer.The price for the software is $50. Payment can be made in Ethereum only.

How do I pay, where do I get Ethereum?

Purchasing Ethereum varies from country to country, you are best advised to do a quick google search

yourself to find out how to buy Ethereum.

Payment informationAmount: 0,039 ETH

 

IOC DETAILS

ce0d8cbee780e57c0e871f1f10d95a35dcf6bdb0d07bd0306a83f8b43df8080a


What can you do to avoid being a ransomware victim?


As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.


Scrutinize emails & its attachments before opening them


Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email.


Avoid clicking embedded links found in unverified emails


Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site.


Back up your important files


While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your own system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media, and one of those copies in a separate location.


Regularly update software, programs, applications


Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrive via vulnerability exploits.


Use a layered protection suite


Doing so can detect threats before they enter your network. Security solutions like SecneurX ATP can block Infectious files (like executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on) by scanning them at the point of entry of the organisations (File uploads, USB file transfers etc)


11 views0 comments

Recent Posts

See All
bottom of page