The ramp is ransomware that belongs to the Killnet Ransomware family. SecneurX Malware Analyst found that Ramp encrypts files and appends its extension (".terror_ramp3") to filenames. Also, it drops the "ramp3.txt" file that contains a ransom note.
After executing the Ramp ransomware all files and folders got encrypted and appended their filenames with a ".terror_ramp3" extension. For Example, a file titled "Comapnydetails.doc" appeared as "Comapnydetails.doc.terror_ramp3", "Jan2020.docx" as "Jan2020.docx.terror_ramp3", and so on.
Screenshot of files encrypted by Ramp ransomware
Ramp Ransomware Overview
Ramp ransomware notes inform victims that their files have been encrypted. It instructs victims to send an SMS with the text Telegram User @WHITE_ROS4 and asks the user to enter the code only one time if it exceeds all data will be irreversibly corrupted. And they also provided a telegram channel
How does ransomware infect my computer?
Malware (ransomware included) is spread using phishing and social engineering tactics. Malicious programs are typically presented as or bundled with ordinary content. Infectious files can be executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on. When a virulent file is executed, run, or otherwise opened - the infection process is jumpstarted.
Screenshot of Ramp Ransomware Text file (“ramp3.txt”)
Translated ramp3.txt
WARNING! All your files are encrypted!
To restore and access your files,
send an SMS with the text Telegram User @WHITE_ROS
You have 1 attempt to enter the code. If this
number will be exceeded, all data will be irreversibly corrupted. Having been
be careful when entering the code!
Channels: @white_ros4bio | @vip_swatting |
Hello from Killnet
Hello Keygroup
IOC DETAILS
f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f
What can you do to avoid being a ransomware victim?
As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.
Scrutinize emails & their attachments before opening them
Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email
Avoid clicking embedded links found in unverified emails
Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site
Back up your important files
While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media and one of those copies in a separate location.
Regularly update software, programs, and applications
Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrives via vulnerability exploits.
Use SecneurX Advanced Threat Prevention (ATP)
Doing so can detect threats before they enter your network. SecneurX ATP can block Infectious files (like executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on) by scanning them at the point of entry of the organisations (File uploads, USB file transfers etc)
Read more about Advanced Threat Prevention here
Comments