Power Worm Ransomware Accidentally Destroys Victim's Data During Encryption

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
A variant of the Power Worm ransomware is infecting computers, encrypting their data files, and throwing away the encryption key, all because of an error in the malware's programming.

The Power Worm malware is a PowerShell-based ransomware, which uses the Windows PowerShell to initiate and execute its malicious activity.

The Windows PowerShell is a framework developed by Microsoft to allow developers to automate tasks and operations on Windows PCs.

Trend Micro researchers were the ones that discovered the Power Worm ransomware back in March 2014, when they've detected an active campaign targeting Word and Excel files.

The hacker made an error in the encryption routine's code
This particular variant of the Power Worm ransomware targets a broader scope of data file types, but this is not the particular "feature" that makes it stand out amongst other ransomware families.

The "feature" is actually a badly implemented encryption routine, caused in the hacker's attempt at simplifying the decryption process and cutting down operational costs.

As Nathan Scott, a malware researcher explained to Bleeping Computer, the ransomware's author used the AES encryption engine, but wanted to do away with the random and unique encryption keys generated for each user, and use a static AES key instead, the same for each victim.

This would have allowed him to simplify the website where users download the decryption keys, by not having to query a database of private decryption keys, and then serve a custom-generated decryption tool based on a local ID generated for each infected user.

Users cannot recover the files encrypted by this ransomware
The problem is that a programming error (improperly padded AES key) led to the ransomware generating random decryption keys instead of static keys. Because the author had not prepared special routines inside the malware's code to deal and store random keys, the ransomware was encrypting files, and then throwing away the decryption key.

The only way users can recover their files is if they restore them from a backup.

You can recognize if you have been infected by this ransomware by the ransom message it shows, copied from the CryptoWall ransomware. For all users, the user ID is always "qDgx5Bs8H" because the author knew users would have the same encryption key. There's a screenshot of the ransom message below, courtesy of Bleeping Computer.
epic-fail-power-worm-ransomware-accidentally-destroys-victim-s-data-during-encryption-495833-3.jpg
 

Secondmineboy

Level 26
Verified
May 25, 2014
1,559
It is bad enough when a ransomware infection encrypts your data and demands a ransom, but it's even worse when shoddy programming destroys it instead. This is what happened in a new variant of the Power Worm ransomware where bad programming encrypts your data using AES encryption and then throws away the key. Since the decryption key was not properly initialized and not saved, a victim's files become unrecoverable even if they wanted to pay the ransom. Therefore, if you are a victim of this infection, DO NOT pay the ransom as it will not help you recover your files.

View full article for details :) Shoddy Programming causes new Ransomware to destroy your Data I can no longer see this stuff in News all day long, in ten years you will get infected by forgetting to install a security update 10 minutes after release or what?
 
  • Like
Reactions: LabZero
L

LabZero

Ransomware is a real problem that goes beyond the classic trojan. They are something much more serious, capable of destroying your personal documents in a few minutes.
This is why It should not enter on our PC. The encrypted data are already destroyed (even without this case of programming error) If you don't pay the ransom and ... the ransom should not be paid.
Don't pay a single dollar for a ransomware, do not give in to rackets by those who exploit the misinformation and the lack of security of many average users. Paying these criminals won't change the things.
Backup is the master word!
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Anything which is 'stupid' will actually happen upon the ransom scenarios.

Don't you think they satisfy on just one time payment? Of course not, as big surprise are plan for operation.

So decryption keys can also be fake/invalid no matter since those writers conduct upon operation + insisting another ransom.
 
  • Like
Reactions: Moose

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top