Is this the most vicious slander that has been created to this day? • HWzone
ComputersTechnologyFeatured articles

Is this the most vicious slander that has been created to this day?

The feverish mind of online criminals continues to surprise: this time with That encrypts the victim files and offers an opening option only after it has made other users familiar with it

Get updates from everyone in TelgramGet updates from us all at TelgramJoin the channel now


Sometimes it seems that we have already seen all kinds of malware that can be imagined on the web: distributing sites Impersonating especially popular sites, damages that disguise themselves as innocent-looking image files, damages that managed to infect legitimate sites and unknowingly distribute to critics, infiltration into hospital and transportation computing systems, and the host's sensitive information and more - These are all just examples of the last year in a field that has become very profitable outlaws with knowledge and experience in the computer and software world.

Yet, A fresh market called Popcorn Time (regardless of the renowned P2P-based video streaming service) may be a new culprit in the field - one that incorporates social engineering to ensure that it continues to spread among users even if its online sources are blocked.

Not the Popcorn Time you know - nor the kind you'll ever want to know
Not the Popcorn Time you know - nor one you ever want to know

This feature works like most other modern ransom cases: some of the victim's personal files are encrypted with an advanced and challenging hacking key, and their release is only possible after transferring a single Bitcoin coin (with a current value of about 782 dollars) to a digital wallet and receiving an appropriate decoding code - Tapping the wrong code four times in a row can cause the information to be completely deleted, perhaps on purpose Challenge projects like No More Ransom Who claim to provide free solutions to all those who have been harmed by this despicable phenomenon.

bll1

Popcorn Time's upgrade comes with the option to receive suggested decoding code for users - if they decide to become victims to collaborators, they will distribute a dedicated link to paste between people they know (or not necessarily), leaving at least two new pastors to pay the required ransom. As mentioned, maliciousness on its behalf, as stated.

The new malware was originally discovered by members of the MalwareHunterTeam group In their Twitter account, And was documented in a more detailed manner At the Bleepingcomputer site Later. We have no information about its prevalence at this time, but there is no doubt that the proposal to catch up with others in the hope of getting a 'gift' at the expense of their money and suffering will help it spread more effectively than other ransom infractions.

The file encryption process impersonates a screen similar to the Windows update screen
The file encryption process impersonates a screen similar to the Windows update screen

Let us hope that this tactic will not become the new trend in the field, one that will begin to decorate the primitive and threatening screens of all the various ruthless infestations that are circulating in the net.


Tags

17 תגובות

  1. It's a regret even if I lock the board if you can reset the board and then it returns to normal mode and then updates it back so what's the thing these idiots do to people

    1. And even then…. There is an iron pin on the motherboard 2 listed below them CLR_CMOS you just turn off the computer and shorten those pins

      Or doing the battery trick

      1. What battery trick? What's the battery connection?
        It's about encrypting the files that are on the hard disk in the NTFS table.
        Take the hard disk and plug in another computer, it will still be encrypted unless you format it

    1. And what does that help you with?

      Let's say we watched the movie of the wedding and all the pictures. Let's say you don't have everyone backed up elsewhere.

      What exactly can you do?

      Zero bios. The situation remains that these files are inaccessible.

  2. Quote of ben672

    They do not lock the board, they encrypt the files. For the purpose of the article: If this is true, you can simply create virtual machines and two free emails and free the files.

    According to the article, both victims must pay * so that you can release your files.

  3. Quote of MiniMizer

    According to the article, both victims must pay * so that you can release your files.

    True, I noticed it afterwards.

    So I wrote in the original article,

    For some reason this forum remains without editing.

  4. Quote of summer69

    What battery trick? What is a battery connection? This is the encryption of the files that are on the hard disk in the NTFS table. Take the hard disk and connect to another computer, it will still be encrypted, unless you format it

    There was someone who said there was a virus that put a bios password

Leave a Reply

Back to top button
Close
Close