Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

That 'new Windows 10 update' could be packed with ransomware (and probably IS)
TechRadar Pro ^ | Nov 22, 2019 | nthony Spadafora

Posted on 11/26/2019 7:35:51 PM PST by dayglored

Users warned not to open email claiming to be from Microsoft concerning a Windows 10 update.

Users have been warned not to download a fake Windows 10 update which is actually packed with malware.

Security researchers from Trustwave's SpiderLabs have uncovered a new malicious campaign that spoofs an urgent update email from Microsoft to infect user's systems with the Cyborg ransomware.

Targeted users first receive an email with either the subject line 'Install Latest Microsoft Windows Update now!' or 'Critical Microsoft Windows Update!' which is already suspicious as Microsoft pushes Windows updates through its operating system and never through emails.

The email itself contains just one line of text which reads: “Please install the latest critical update from Microsoft attached to this email”. While the fake update attachment has “.jpg” file extension, it is actually not a picture but instead is an executable file.

This executable file is a malicious .NET download that the attackers have designed to deliver malware to the infected system.

Cyborg ransomware

Upon clicking on the email's attachment, the executable hidden within it downloads a file called 'bitcoingenerator.exe' from a GitHub account with the name misterbtc2020. Just like with the attachment itself, this file is a .NET compiled malware known as the Cyborg ransomware.

Once activated, the ransomware encrypts all of the files on the infected user's system and appends their filenames with its own file extension, 777. A ransom note with the filename 'Cyborg_DECRYPT.txt' is then left on the desktop of the compromised machine. Finally the ransomware leaves a copy of itself called 'bot.exe' hidden at the root of the infected drive.

In an effort to better understand the variants of the Cyborg ransomware, Trustwave researchers searched for the original filename of the ransomware they obtained and searched for it in VirusTotal. There they found three other samples of this ransomware and discovered that a builder for it exists online.

The researchers also found a GitHub account with the name Cyborg-Ransomware that contained a repository with the ransomware builder binaries as well as a second repository with a link to the Russian version of the same builder hosted on another site.

Trustwave's Diana Lopera explained why the Cyborg ransomware poses a serious threat to individuals and businesses in a blog post, saying:

“The Cyborg Ransomware can be created and spread by anyone who gets hold of the builder. It can be spammed using other themes and be attached in different forms to evade email gateways. Attackers can craft this ransomware to use a known ransomware file extension to mislead the infected user from the identity of this ransomware.”



TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: microsoft; randomware; windows; windows10; windowspinglist; windowsupdate
Navigation: use the links below to view more comments.
first previous 1-2021-25 last
To: dayglored

Another reason I turned off Windows Update and stick with Windows 7.


21 posted on 11/26/2019 9:44:56 PM PST by OrangeHoof (The Democrats - Unafraid to burn in Hell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Yep - too many don’t keep their thinking caps on...one of the biggest deals these days are the ones where they say, “We need your confirmation to unsubscribe”....


22 posted on 11/27/2019 3:26:18 AM PST by trebb (Don't howl about illegal leeches, or Trump in general, while not donating to FR - it's hypocritical.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Never open anything from an email unless you asked for it.


23 posted on 11/27/2019 3:49:06 AM PST by pas
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Another good option is to create an Admin account with a different password that you use only for specific tasks on an as-needed basis. Then demote your regular account from "Administrator" to "Standard". This will stop a lot of sketchy stuff from happening because you'll get a warning and have to type in the admin password.

If you're working on a company-owned business PC and your IT team gives you local admin rights, your company is in trouble.
24 posted on 11/27/2019 10:32:06 AM PST by JayNorth (The Democrats have proven themselves to be pure evil.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JayNorth
> If you're working on a company-owned business PC and your IT team gives you local admin rights, your company is in trouble.

Great way to open the doors to malware, ransomware, you name it. Not to mention misconfiguration galore.

And did I mention, the disgruntled employee? All manner of mischief occurs when an employee loses their gruntles.

25 posted on 11/27/2019 11:02:26 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 24 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-25 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson