Malware News After Researchers Crack Wildfire Ransomware, Crooks Return with Hades Locker

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
The group behind the Wildfire ransomware don't seem to have lost interest in the malware scene after security researchers cracked their first ransomware's encryption scheme at the end of August and destroyed their operation.

In fact, it appears that the group spent all last month working on a new version, which at the time of writing doesn't feature the same coding flaw that allowed Kaspersky and McAfee researchers to create a free decrypter.

This new version, rebranded as the Hades Locker, is distributed via spam email, courtesy of the massive Kelihos botnet.

Security researcher Michael Gillespie detected the first version of this threat on October 4 when a Hades Locker victim uploaded a copy of the ransomware's ransom note on the ID Ransomware service.

Hades Locker mimics Locky's UI
Analysis by Bleeping Computer and Proofpoint reveals a lot of similarities with the original Wildfire ransomware, except the graphical user interface, which now uses a ransom note and desktop wallpaper similar to the ones utilized by the more deadly and well-known Locky ransomware.
Hades Locker works by encrypting user files with an AES encryption algorithm and then appending the "~HLH6215" extension at the end of each file.

If users don't have copies or backups to restore their files, Hades Locker authors request a $600 / €500 / £400 payment in Bitcoin via a website hosted on the Dark Web, accessible only over the Tor Browser.

Hades Locker spread via the Kelihos botnet
Wildfire, previously also known as Zyklon, targeted only Dutch and Belgian users. Currently, it is unknown if Hades Locker targets users in those two countries alone, or if it has gone global.

The Kelihos botnet, used to distributed Hades Locker and Wildfire, has also been employed to spread other ransomware families such as CryptFile2 and MarsJoke. These two ransomware families have targeted local and state government agencies in the US, along with K-12 educational institutions.

 

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Seems they want redemption, they got egg on their face and lost rep.
So it's not a surprise they want to try again. I hope they fail again too ;)
Cool share Exterminator.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top