0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported.
The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations.
Victims of the ransomware reported that the malware adds the .0mega extension to the encrypted file’s names and creates for each victim a customized ransom note named DECRYPT-FILES.txt.
The operators behind this ransomware in some cases included in the ransom note details on how to disclose the attack to business partners and trade associations in case the victim will not pay the ransom.
Like other ransomware gangs, the operators use a payment negotiation site hosted on the Tor network.
Victims can contact the operators via the negotiation site by uploading the ransom note dropped on their systems, obviously the note includes a unique identifier.
The researchers Andrew Ivanov, who worked with Lawrence Abrams, published a blog post that includes details about the ransomware.
BleepingComputer confirmed that at the time of their report, the researchers have yet to find a 0mega sample.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…
An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…
Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…
Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…
Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…
Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…
This website uses cookies.