Skynetwork Ransomware Threatens Corporate Data Security

ransomware

During our investigation into new ransomware samples, our researchers discovered Skynetwork ransomware. This malware belongs to the MedusaLocker ransomware family and its purpose is to encrypt data and demand a ransom for its decryption.

We tested the Skynetwork ransomware on our system and found that it encrypted files by adding a ".skynetwork8" extension to their titles. For instance, a file named "1.jpg" would become "1.jpg.skynetwork8", and so on. The ransomware also dropped a file named "How_to_back_files.html" on the desktop, which contains the ransom-demanding message.

The ransom note makes it clear that this ransomware targets companies rather than individual users. It claims that the victim's company network has been infiltrated and that the encrypted files are inaccessible because they were encrypted using RSA and AES cryptographic algorithms. The note warns against renaming or modifying the affected files, as well as using third-party decryption software, as these actions may corrupt the files permanently.

Victims are given 72 hours to pay the ransom, and after this deadline, the amount will increase. The ransom note also claims that highly confidential and personal data has been exfiltrated from the network and will be leaked or sold if the ransom demands are not met. However, we strongly advise against paying the ransom, as there is no guarantee that the data will be recovered even after payment. In fact, it is rare for victims to receive the promised decryption keys/software, and paying the ransom only supports this illegal activity.

Based on our extensive experience with analyzing and researching ransomware infections, we have found that decryption without the attackers' involvement is rarely possible. Therefore, we urge victims to avoid paying the ransom and to seek professional assistance in recovering their data instead.

Skynetwork Copies Massive MedusaLocker Note

The complete text of the Skynetwork ransom note reads as follows:

YOUR PERSONAL ID:

! YOUR COMPANY NETWORK HAS BEEN PENETRATED !
All your important files have been encrypted!

Your files are safe! Only modified. (RSA+AES)

ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE
WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.

No software available on internet can help you. We are the only ones able to
solve your problem.

We gathered highly confidential/personal data. These data are currently stored on
a private server. This server will be immediately destroyed after your payment.
If you decide to not pay, we will release your data to public or re-seller.
So you can expect your data to be publicly available in the near future..

We only seek money and our goal is not to damage your reputation or prevent
your business from running.

You will can send us 2-3 non-important files and we will decrypt it for free
to prove we are able to give your files back.

Contact us for price and get decryption software.

onion address

  • Note that this server is available via Tor browser only

Follow the instructions to open the link:

  1. Type the addres "hxxps://www.torproject.org" in your Internet browser. It opens the Tor site.
  2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.
  3. Now you have Tor browser. In the Tor Browser open qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion
  4. Start a chat and follow the further instructions.
    If you can not use the above link, use the email:
    ithelp02@decorous.cyou
    ithelp02@wholeness.business
  • To contact us, create a new free email account on the site: protonmail.com
    IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

Why Is it Never a Good Idea to Pay Ransom Demands to Hackers?

Paying ransom demands to hackers is never a good idea because it encourages and supports illegal activity. Cybercriminals use ransomware attacks to extort money from victims by encrypting their valuable data and demanding payment for its release. However, paying the ransom does not guarantee that the hackers will decrypt the data, and it may even embolden them to launch further attacks.

Furthermore, paying the ransom provides financial incentives for hackers to continue their criminal activities and invest in improving their attack methods. It also contributes to the proliferation of ransomware attacks, creating a cycle of criminal activity that threatens the security and stability of businesses and individuals alike. Therefore, experts advise against paying ransom demands and instead recommend investing in preventive measures such as data backups, network security, and employee training to minimize the risk of falling victim to a ransomware attack.

March 6, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.