Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Far Attack/MedusaLocker3 (.farattack, .itlock*, .busavelock*) Support Topic


  • Please log in to reply
76 replies to this topic

#16 GtsKsa2

GtsKsa2

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 22 March 2022 - 03:44 AM

We were hit by the same ransomware. I contacted the Hacker. They asked for 10,000 USD at first then they reduced to 7,000 USD.

I offered 2,000 USD but they refused so i stopped the negotiation with them.

I also suspect of the RDP unsecure connection. Even they encrypted hidden and backup drives.

 

I also asked for proof to decrypt a sql database. They refused but sent me a video of the decryption. Below are all the files exchanged.

 

For the sample files they did not ask for the note. Just the encrypted file.

 

The video for the decryption in in the following link: https://we.tl/t-7IVDKGve07

Attached Files


Edited by GtsKsa2, 22 March 2022 - 03:59 AM.


BC AdBot (Login to Remove)

 


#17 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 22 March 2022 - 07:28 AM

Most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers. I explain why in this topic which includes victim experiences relating to dealing with them.


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#18 jludvik

jludvik

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:45 AM

Posted 31 March 2022 - 08:12 AM

Hello, infected by a variant of Ransomware encrypting files and adding .chuklock extension. Infected Windows Server 2019.

Do you recognize this? Can someone point me to the right tools and direction? Does anyone know the attact vector? How the heck it came to me?

 

Attaching the ransom note and sample short encrypted TXT file.

Attached Files



#19 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 31 March 2022 - 09:22 AM

Can you provide (copy & paste) the ransom note contents in your next reply?

 
Please submit (upload) samples of encrypted files, ransom notes and any contact email addresses provided by the cyber-criminals to ID Ransomware (IDR) for assistance with identification and confirmation of the infection. ID Ransomware can identify ransomware which adds a prefix instead of an extension and more accurately identifies ransomware by filemarkers if applicable. Uploading both encrypted files and ransom notes together along with any email addresses provided gives a more positive match with identification and helps to avoid false detections. Please provide a link to the ID Ransomware results

If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 (Michael Gillespie) to manually inspect the files and check for possible file markers.
 

.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#20 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,003 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:07:45 AM

Posted 31 March 2022 - 12:44 PM


My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#21 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 31 March 2022 - 12:55 PM

jludvik

I have merged your topic into the primary support topic for victims of this ransomware.

.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#22 GtsKsa2

GtsKsa2

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 17 May 2022 - 11:42 AM

There is a Member who contacted me through PM and offered his sevices to crack farattack ransomware. He was able to recover an encrypted file and then he asked for 7500 USD. Is he legit? I suspect him to be a middle man.
Member Name:spam82828282 or spam82828282
Email: <removed?



#23 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 17 May 2022 - 03:30 PM

Bleeping Computer cannot vouch for those who claim they can decrypt data or help in other ways. 
 
While the individual or company may be legitimate, we have have no way of knowing the background, expertise or motives of all companies or individuals who indicate decryption is possible. Our experts have found that many who claim they can decrypt your files actually represent data recovery services which act as a "middleman"...they just pay the criminals...pretend they cracked the decryption and charge the victim more than the ransom demands, in many cases not telling them that is how they acquired the means of decryption. We can only advise to be cautious with whomever you are dealing with, what services they are able to provide and what claims they make before sending money or paying a fee to anyone.
 
Ransomware victims should IGNORE, (not reply back, deal with or negotiate payments with) anyone who may contact them via Private Message (PM) on this forum or by email making claims they can decrypt your data.
 
Please read my comments in this topic for information as to what we know about those who claim they can decrypt data (including scammers and data recovery services).


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#24 Believer1

Believer1

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:45 AM

Posted 02 August 2022 - 08:38 AM

Hi guys apparently Ive got a slight new variant.
A friend sends me this photo and tells me his company got hit by ransomware.
https://ibb.co/YN6SKwJ
https://ibb.co/QY8tfHZ
Unfortunately at the time I got the message business was closed and couldnt get a sample.
In a couple hours Ill be there and get the sample and sent it to you guys, for now I would like to now everything about this ransomware.
I am certified oscp but ransomware attacks are outside my expertise so appreciate all the help in advanced.

#25 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,003 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:07:45 AM

Posted 03 August 2022 - 01:23 AM

Ransom notes files must be uploaded in their original form. As pictures, they are useless.
Ransom note must be 100% original. The address and contacts should not be erased or changed.
 
Any distortion is critical and is regarded as disinformation. :) (Alas, time is very expensive, there is no way to wait for an answer all summer.)

Edited by Amigo-A, 03 August 2022 - 01:28 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#26 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,003 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:07:45 AM

Posted 04 August 2022 - 06:01 AM

In terms of the format of the encrypted file, it might be GlobeImposter 2.0, but in terms of how others use ransom's elements, it could be the FarAttack group, that's what I called it.
In both cases, there is no way to decrypt files without paying a ransom. Anyway, now.
 
The ransom notes needed to be kept, but now even paying the ransom will not help, because. code cannot be copied correctly.

Edited by Amigo-A, 04 August 2022 - 06:04 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#27 Believer1

Believer1

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:45 AM

Posted 04 August 2022 - 08:04 AM

Weird thing is I finally got the chance to access the computer directly but it seems the ransom notes deleted themselves.
Still just recovered to backup successfully just wanted to document the variant thats all.
Thx for the help

#28 Believer1

Believer1

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:45 AM

Posted 04 August 2022 - 08:06 AM

Also one more thing, I used apples text recognition in photos and got the whole id from the photo, not thats its useful now but its a neat trick.

#29 Underwater-BG

Underwater-BG

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 22 October 2022 - 09:16 AM

Hi.

I have been hit by .Skynet ransomware. Is there decryption tool for this ransomware?
Files attached.

 

Thanks in advance.

 

Attached File  Skynet.zip   16.39KB   3 downloads



#30 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 22 October 2022 - 09:54 AM

What is Skynet ransomware?
 
Unfortunately, there is no known method that I am aware of to decrypt files encrypted by this ransomware without paying the ransom (not advisable) and obtaining the private encryption keys from the criminals who created the ransomware unless they are leaked or seized & released by authorities. Without the master private key that can be used to decrypt your files, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way (i.e. RSA, AES, Salsa20, ChaCha20, ECDH, ECC) that cannot be brute-forced.
 
If feasible, your best option is to restore from backups, try file recovery software to recover (not decrypt) some of your original files or backup/save your encrypted data as is and wait for a possible solution at a later time.


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users