Morning Tick
  • Latest News
    • Bitcoin
    • Ethereum
    • Ripple and XRP
    • Fintech
    • Altcoins
  • Market Analysis
  • Resources
  • Contact
    • About Us
    • Press Toolkit
Facebook Twitter Instagram
Morning Tick
  • Latest News
    • Bitcoin
    • Ethereum
    • Ripple and XRP
    • Fintech
    • Altcoins
  • Market Analysis
  • Resources
  • Contact
    • About Us
    • Press Toolkit
Facebook Twitter Instagram
Morning Tick
Ransomware

Exorcist 2.0 ransomware misdirects users to proxy sites for malware delivery

Manas PimpalkhareBy Manas PimpalkhareUpdated:October 22, 2020 on October 22, 2020
Exorcist 2.0 ransomware misdirects users to proxy sites for malware delivery
Image credit: Pixabay
Share
Reddit Facebook Twitter LinkedIn Pinterest WhatsApp Email

Ransomware group Exorcist 2.0 is constantly confounding internet users by broadcasting malicious advertising on proxy websites. These proxy websites are built to distribute the malware into target computers.

An organization called PopCash malvertising is directing users from legitimate sites to fake malware sites.

Specifically, the fake sites hold hyperlinks that facilitate free downloads of paid software. Actually, this amounts to copyright infringement. One such shady website hosted a link for the free activation of a 2020 version of Windows 10.

No (holy water) malware security can stop this Exorcist 2.0

Additionally, hackers have devised a way to get around Google’s malware security.

Once users download the files from the shady websites, they get access to a ‘zip’ file that comes with password protection. It is necessary to execute this file in order to get the software for free.

Users also receive the password along with the downloaded files. Once the zip files begin downloading using the allotted password, it becomes impossible for Google’s malware security to protect the target computer.

Once the download is complete and the setup program is run, all user files are encrypted. These files have distinguishable extensions that are tell-tale signs of a cyberattack. The malware uses an encryption algorithm that appends the files with random extensions, mostly consisting of five random alphabets.

After the encryption process is complete, it creates a file of “HTA” extension, which when clicked opens a ransom note. The Exorcist 2.0 ransomware also creates a separate “key file” for each of the encrypted files.

The encrypted files also hold links to a Tor payments site, which has the guidelines on how to make the ransom payments. The hackers clearly identify themselves as ‘Exorcist 2.0’ in the payments note.

To date, Exorcist 2.0 has demanded a ransom between the brackets of $250 – $10,000. However, it is possible that the group is demanding higher ransom from more valuable targets.

Ransomware Security
Disclaimer
Read More Read Less
The information provided on this website shouldn’t be considered as investment, tax, legal, or trading advice. Morning Tick is not an investment advisory platform, nor do we intend to be. The publication, its’s management team, or authored-by-line doesn’t seem liable for your personal financial losses, which may be due to your panic decisions based on the content we published. We strongly recommend considering our stories as just a piece of information, unlike advice, recommendations, or requests. Some of the contents may get outdated, updated, or inaccurate despite our profound editorial policies. We urge readers to do their due diligence before making any investments decision with ongoing IDOs, ICOs, IEOs, or any other kind of financial offerings. Few outbound links may be commissioned or affiliated, which helps us grow financially and maintain healthy editorial norms. For more information, visit disclaimer page.
Share. Facebook Twitter Pinterest LinkedIn Email Reddit WhatsApp
Previous ArticleUS lawmakers merge two bills promoting Blockchain tech to ensure Consumer safety
Next Article Pakistan eyes domestic AI solution for cybersecurity
Manas Pimpalkhare
  • Twitter

Aspiring Tech Journalist, Lawyer-to-be, has a keen interest in cybercrime and disruptive tech like AI, 5G, and crypto.

Recommended Posts

Bitcoiner alerts ‘overconfident HODLers’ after losing 2.6 BTC

January 11, 2021

The 10 Biggest Data Breaches that grabbed attention in 2020

December 24, 2020

Adware is the new Malware that everyone needs to know

November 25, 2020

Donald Trump fires cybersecurity chief Chris Krebs after he debunked voter fraud theories

November 18, 2020
Add A Comment

Comments are closed.

Latest

Introducing Lucky Mystery Box, Crypto lottery based on TRON with a prize pool of 1M USDT

4 months ago

GlobalDots joins forces with Coralogix to save companies 40-70% on full-stack observability costs, launching a debut CDN log management solution

5 months ago

KX.finance announces upcoming DeFi/DEX aggregator launch on APTOS/SUI blockchain

6 months ago

HyperBC Group unveils Zero interest Crypto Credit Card HyperCard, obtains Lithuanian Financial License

6 months ago

Unplugged launches its mobile App Suite to help consumers reclaim their privacy

6 months ago
Morning Tick
Facebook Twitter Instagram Pinterest RSS
  • About Us
  • Press Toolkit
  • Disclaimer
  • Contact Us
  • Privacy Policy
  • Sitemap
© 2023 Morning Tick. Disclaimer: The information provided on this website shouldn't be considered as investment, tax, legal, or trading advice.

Type above and press Enter to search. Press Esc to cancel.