DeathRansom Evolves From Prank To Threatening Reality
Image Via https://www.piqsels.com/

Once thought of as a mere prank, this ransomware method was never taken seriously by cybersecurity experts around the globe. The basic methodology of DeathRansom was a very basic one. It involved tricking a user into coughing up a ransom without actually quarantining his files. This was very interesting and new for basic hackers who were looking for some quick earnings or people who wanted to prank their friends.

The earlier version of DeathRansom just had a flashy message claiming that the encrypted files of the user will only be decrypted if the due ransom is submitted. However, the data, in reality, were never encrypted, but some users did not realize that and ended up paying the said ransom.

DeathRansom Evolves From Prank To Threatening Reality
Image Via https://www.piqsels.com/

However, the more significant concern is the latest upgrade of DeathRansom’s ransomware algorithm. It was revised and upgraded from the basic version by a group of black-hats. It involves the use of the XOR algorithm to encrypt files in reality and on a larger scale. There is no loops or implementation error for this ransomware, as mentioned by cybersecurity experts who are looking at DeathRansom’s methodology objectively.

Fortinet Doing It’s Best To Curb DeathRansom’s Rise: Officials

Fortinet is one such cybersecurity agency looking into DeathRansom’s weaknesses. However, to their dismay, they discover that the entire ransomware process is under progress across many years now. The founder of this ransomware regularly feeds victims with password stealers and fake cryptocurrency miners.

Now, this, when done at a large scale and for a significant period, can yield fatal results. DeathRansom’s author has successfully managed to achieve that behind the scenes of a prank-based ransomware application.

Junk mails and spam Facebook messages are regular places where you will find this genre of ransomware cropping up. Fortinet has already developed some ransomware decryption techniques that victims can purchase for use. They are also mainly developing security systems preventing ransomware from affecting companies or bigger workplaces.

LEAVE A REPLY

Please enter your comment!
Please enter your name here