Zombi Ransomware Encrypts Victim Systems

ransomware lock files

During our investigation into new file samples, our research team came across another ransomware variant belonging to the MedusaLocker family, named Zombi.

This malicious software follows the typical pattern of encrypting data and demanding ransom for decryption, with a focus on larger entities such as companies and organizations rather than individual users. Zombi also employs double extortion tactics.

Upon executing a sample of Zombi on our test machine, it encrypted files and added a ".zombi2" extension to their filenames, with the specific number varying based on the variant. For instance, an original file named "1.jpg" would be transformed into "1.jpg.zombi2," and so on. Subsequently, a ransom note titled "How_to_back_files.html" was generated.

The ransom message notifies the victim that their company network has been breached, leading to the encryption of files using RSA and AES cryptographic algorithms, as well as the theft of confidential or personal data.

The victim is warned that any attempts to rename or modify the encrypted files, or the use of third-party recovery software, may result in data corruption, rendering it irretrievable.

The attackers demand an unspecified ransom, with the threat of an increase if contact is not established within 72 hours. Refusal to pay will lead to the leaking or selling of the exfiltrated data. Before making the payment, the victim is given the option to test decryption by sending up to three encrypted files that do not contain critical information to the cybercriminals.

Zombi Ransom Note Provided Onion Address

The full text of the Zombi ransom note reads as follows:

YOUR PERSONAL ID:

YOUR COMPANY NETWORK HAS BEEN PENETRATED
All your important files have been encrypted!

Your files are safe! Only modified. (RSA+AES)

ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE
WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.

No software available on internet can help you. We are the only ones able to
solve your problem.

We gathered highly confidential/personal data. These data are currently stored on
a private server. This server will be immediately destroyed after your payment.
If you decide to not pay, we will release your data to public or re-seller.
So you can expect your data to be publicly available in the near future..

We only seek money and our goal is not to damage your reputation or prevent
your business from running.

You will can send us 2-3 non-important files and we will decrypt it for free
to prove we are able to give your files back.

Contact us for price and get decryption software.

email:
ithelp07@securitymy.name
ithelp07@yousheltered.com

To contact us, create a new free email account on the site: protonmail.com
IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

Tor-chat to always be in touch:
(onion address)

How Can Ransomware Find Its Way on Your System?

Ransomware can find its way onto your system through various means, often exploiting vulnerabilities or tricking users into unknowingly installing malicious software. Here are some common methods:

  • Phishing Emails: Cybercriminals often use phishing emails to distribute ransomware. These emails may contain malicious attachments or links that, when clicked, download and install the ransomware on your system.
  • Malicious Websites: Visiting compromised or malicious websites can expose your system to drive-by downloads, where ransomware is automatically downloaded and executed without your knowledge or consent.
  • Infected Software or Apps: Downloading software or apps from untrustworthy sources can introduce ransomware to your system. Cracked or pirated software is particularly risky, as it may have been tampered with to include malicious code.
  • Exploiting Software Vulnerabilities: Ransomware can exploit vulnerabilities in your operating system or software. It's crucial to keep your system and all software up-to-date with the latest security patches to minimize the risk of exploitation.
  • Malicious Advertisements (Malvertising): Online ads, if compromised, can lead to the delivery of ransomware. Clicking on a malicious ad or pop-up can trigger the download and installation of ransomware on your system.
November 9, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.