ransomware Magniber, the first in the market, for the first time in 2017, becoming the protagonist of a wave of new attacks in the world, is a malware program that targets mainly the users of the final, with the requirements for redeeming ransom ranging from 1000's of dollars.
The history of the Magniber is quite intense, while some other event in the moments of forgetfulness. the ransomware appeared in the year 2017, as the successor of the ransomware Cerber. The operators Magniber have evolved repeatedly, the tactics of their distribution: first of all, by exploiting the vulnerabilities of the day, freezing at the Windows, and then having spread to the discretion of the false for the operating systems and browsers, and in the end, by hiding malware within the çarjeve of the software, and the generators of the main.
#Magniber #ransomware samples
❇️https://t.co/CzErqAsBy5 https://t.co/DUrsQfpTiZ pic.twitter.com/4XLo8M5Pj6
— JAMESWT (@JAMESWT_MHT) August 5, 2024
As we said, the favorite of the Magniber are individual users and small businesses, just because they are more likely to download software pirate. In the second half of July, the demand for assistance in the resolution of the compromises, for the sake of the Magniber they began to grow in the forums of the specialized agencies, and in some cases, the victims reported that their systems were encrypted after the execution of the çarjeve, or the keys of the generators.
When it is activated, Magniber encrypts the files on your device and adds up an extra and use it with 5-9 character (like the p.moreover, it has. .oaxysw either .oymtk) the names of the files to be enkriptuar. the ransomware creates a record, to be called READ_ME.htm that contains the information about the incident, and in a relationship, unique in the page, the Tor of the strikers, for the negotiation of the compensation. As you say, the request is launched from the 1000's of dollars, while it was increased to 5000 dollars, if the fee (in Bitcoin) is not performed within the first three days.
Presently there is no solution, free of charge, to be deciphered, the files affected by the latest versions of the Magniber. In 2018, AhnLab issued a dekriptues for the Magniber, but the developers of the ransomware entries vulnerability, which made him an effective, which makes it impossible to dekriptimin files free of charge with the current versions.
Discussion about this post