[ad_1]
R Trojan akhni that was discovered in 2013 evolved over the course of five years. In addition to its already existing and infamous ransomware feature, the Trojan is now able to infect your computer with a cryptocurrency miner. The decision to choose the mechanism to harm your computer depends on the configuration of the victim.
This dual threat posed by the old ransomware was exposed by a report from Kaspersky Labs, which was titled To Encrypt, or for MIne- That Is The Question. The report explains in detail a downloader who decides how to infect the victim – with an encryptor or a miner
The mail targeted computers in Russia, Kazakhstan, Ukraine, Germany and India and is distributed via campaigns. spam. . These emails contain fake company financial documents that emphasize the actor's plan to target businesses.
According to the researchers, "to hide the presence of malicious software in the system, the malware developer has made its creation look like Adobe Systems products. "
After being downloaded to the target computer, the malicious software then looks for the presence of a crypto-currency wallet. If the Bitcoin data folder or% AppData% Bitcoin is found, so he downloads a cryptor module that creates a ransomware message with the ransom recipient's email id and a delay.
Otherwise, if such a folder is not found the targeted computer, a minor module is downloaded that creates a VBS script for the extraction Monero or Dashcoin Cryptocurrency.
To appease your fears, decryption tools for Rakhni ransomware are available to get rid of the new and intelligent ransomware. unprecedented choice of means of infection suggests the level of sophistication that cyber criminals have evolved over the years.
Also read: New WhatsApp feature to combat fake news and s pams under test
[ad_2]
Source link