0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported.
The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations.
Victims of the ransomware reported that the malware adds the .0mega extension to the encrypted file’s names and creates for each victim a customized ransom note named DECRYPT-FILES.txt.
The operators behind this ransomware in some cases included in the ransom note details on how to disclose the attack to business partners and trade associations in case the victim will not pay the ransom.
Like other ransomware gangs, the operators use a payment negotiation site hosted on the Tor network.
Victims can contact the operators via the negotiation site by uploading the ransom note dropped on their systems, obviously the note includes a unique identifier.
The researchers Andrew Ivanov, who worked with Lawrence Abrams, published a blog post that includes details about the ransomware.
BleepingComputer confirmed that at the time of their report, the researchers have yet to find a 0mega sample.
Follow me on Twitter: @securityaffairs and Facebook
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, ransomware)