• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 28th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Social Network News

Ransoc Desktop Locker Ransomware Scans Social Media Profiles for Exploitation

November 16th, 2016 Uzair Amir Malware, Privacy, Security, Social Network News 0 comments
Ransoc Desktop Locker Ransomware Scans Social Media Profiles for Exploitation
Share on FacebookShare on Twitter
Researchers have identified a new scheme of ransomware called Ransoc. It is a new type of desktop locking malware that gets activated after it discovers evidence of media files downloaded via Torrents or child pornography links on the targeted computer.

Usually, ransomware tries to encrypt all files on the target computer and then sends out a ransom note explaining the demand of the attacker, which is normally to be paid in Bitcoins. Unless the ransom is paid, the attacker doesn’t give data decryption key to the victim.

Also Read: New Ransomware Asks User to Play Click Me Game while Encrypting Data

Ransoc works differently from standard ransomware; it scrapes Skype and social media profiles along with scanning files and torrents for finding any sort of sensitive information. Then, it customizes a ransom note according to the identified information but does not encrypt files like other ransomware malware – It does threaten victims with bogus legal proceedings in case they fail to pay the ransom.

According to Proofpoint, the penalty notice only emerges when and if it finds some concrete evidence of child pornography or Torrents media files.

ransoc-desktop-locker-ransomware-scans-social-media-profiles-exploitation

With its scraping and scanning capability, the ransomware can display correct personal data, which it takes from Skype and social media profiles. The data also includes profile pictures. The attackers have basically tried to exploit the victim’s fear of exposure and possible legal complications that may result from leaking of such sensitive information.

 

Also Read: Ransomware Disguised as Windows Update Causing Havoc among Users

Proofpoint has also pointed out that it is the reputation of the victim that is actually at stake and this is what attackers are eyeing with this campaign instead of going for the usual technique of data encryption. Ransoc however, also has the capability of accessing the victim’s webcam but the functionality hasn’t been verified yet. Moreover, the ransomware demands payment through credit card, which is yet another exclusivity of this new scheme. Probably the attackers want victims to be able to pay easily without getting into the hassle of Bitcoin processing.

ransoc-desktop-locker-ransomware-scans-social-media-profiles-exploitation-3

The company stated that this is a very “bold approach to ransom payments suggests the threat actors are quite confident that people paying the ransom have enough to hide that they will probably not seek support from law enforcement.”

Although this isn’t the first ransomware to use social engineering techniques for scaring the victim but it is definitely unique in more than one ways. It demands ransom through either the desktop or the browser and infects the system with malvertising traffic, which is targeted towards Internet Explorer on Windows and Safari on OS X.

Also Read: The Nastiest of all Ransomware Mamba Encrypts Entire Hard Drive

[fullsquaread][/fullsquaread]

If your system is infected with ransomware contact ‘No More Ransom’ Anti-Ransomware Portal who have protected 2,500 Ransomware victims and 1.3 million Euros since its launch in July 2016 and that also for free.

[src src=”Image Via” url=”https://pixabay.com/en/internet-computer-screen-monitor-1593378/”]PixaBay/WerbeFabrik[/src] 

  • Tags
  • Cyber Crime
  • Fraud
  • hacking
  • internet
  • Ransomware
  • Scam
  • security
Facebook Twitter LinkedIn Pinterest
Previous article WindTalker Attack Leaks User Data Using Smartphone’s WiFi Signals
Next article Chinese Android Smartphones Sending Data to China through Secret Software
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
World's Most 'Resilient Malware' Botnet Emotet Taken Down

World's Most 'Resilient Malware' Botnet Emotet Taken Down

Top Cybersecurity Threats to Watch in 2021

Top Cybersecurity Threats to Watch in 2021

Database of 176 million Pakistani mobile phone users sold online

Database of 176 million Pakistani mobile phone users sold online

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
NetWalker ransomware disrupted - Cryptocurrency and domain seized
Cyber Crime

NetWalker ransomware disrupted - Cryptocurrency and domain seized

43
Transferring Whatsapp data from iPhone to Android with MobileTrans
How To

Transferring Whatsapp data from iPhone to Android with MobileTrans

29
World's Most 'Resilient Malware' Botnet Emotet Taken Down
Cyber Crime

World's Most 'Resilient Malware' Botnet Emotet Taken Down

85

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us