Power Worm Ransomware Accidentally Destroys Victim's Data During Encryption

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
48,602
8,380
USA
A variant of the Power Worm ransomware is infecting computers, encrypting their data files, and throwing away the encryption key, all because of an error in the malware's programming.

The Power Worm malware is a PowerShell-based ransomware, which uses the Windows PowerShell to initiate and execute its malicious activity.

The Windows PowerShell is a framework developed by Microsoft to allow developers to automate tasks and operations on Windows PCs.

Trend Micro researchers were the ones that discovered the Power Worm ransomware back in March 2014, when they've detected an active campaign targeting Word and Excel files.

The hacker made an error in the encryption routine's code
This particular variant of the Power Worm ransomware targets a broader scope of data file types, but this is not the particular "feature" that makes it stand out amongst other ransomware families.

The "feature" is actually a badly implemented encryption routine, caused in the hacker's attempt at simplifying the decryption process and cutting down operational costs.

As Nathan Scott, a malware researcher explained to Bleeping Computer, the ransomware's author used the AES encryption engine, but wanted to do away with the random and unique encryption keys generated for each user, and use a static AES key instead, the same for each victim.

This would have allowed him to simplify the website where users download the decryption keys, by not having to query a database of private decryption keys, and then serve a custom-generated decryption tool based on a local ID generated for each infected user.

Users cannot recover the files encrypted by this ransomware
The problem is that a programming error (improperly padded AES key) led to the ransomware generating random decryption keys instead of static keys. Because the author had not prepared special routines inside the malware's code to deal and store random keys, the ransomware was encrypting files, and then throwing away the decryption key.

The only way users can recover their files is if they restore them from a backup.

You can recognize if you have been infected by this ransomware by the ransom message it shows, copied from the CryptoWall ransomware. For all users, the user ID is always "qDgx5Bs8H" because the author knew users would have the same encryption key. There's a screenshot of the ransom message below, courtesy of Bleeping Computer.
epic-fail-power-worm-ransomware-accidentally-destroys-victim-s-data-during-encryption-495833-3.jpg
 
It is bad enough when a ransomware infection encrypts your data and demands a ransom, but it's even worse when shoddy programming destroys it instead. This is what happened in a new variant of the Power Worm ransomware where bad programming encrypts your data using AES encryption and then throws away the key. Since the decryption key was not properly initialized and not saved, a victim's files become unrecoverable even if they wanted to pay the ransom. Therefore, if you are a victim of this infection, DO NOT pay the ransom as it will not help you recover your files.

View full article for details :) Shoddy Programming causes new Ransomware to destroy your Data I can no longer see this stuff in News all day long, in ten years you will get infected by forgetting to install a security update 10 minutes after release or what?
 
  • Like
Reactions: LabZero
Ransomware is a real problem that goes beyond the classic trojan. They are something much more serious, capable of destroying your personal documents in a few minutes.
This is why It should not enter on our PC. The encrypted data are already destroyed (even without this case of programming error) If you don't pay the ransom and ... the ransom should not be paid.
Don't pay a single dollar for a ransomware, do not give in to rackets by those who exploit the misinformation and the lack of security of many average users. Paying these criminals won't change the things.
Backup is the master word!
 
Anything which is 'stupid' will actually happen upon the ransom scenarios.

Don't you think they satisfy on just one time payment? Of course not, as big surprise are plan for operation.

So decryption keys can also be fake/invalid no matter since those writers conduct upon operation + insisting another ransom.
 
  • Like
Reactions: Moose

You may also like...