致命鎖定勒索軟體將加密您的文件

在分析新的惡意軟體樣本時,我們遇到了一種稱為 Lethal Lock 的勒索軟體變種。此勒索軟體會對檔案進行加密,並將其副檔名(「.LethalLock」)新增至檔案名稱。此外,Lethal Lock 還會產生勒索字條(“SOLUTION_NOTE.txt”)並更改受害者的桌面桌布。

例如,透過Lethal Lock加密的檔案被重新命名為:“1.jpg”變成“1.jpg.LethalLock”,“2.png”變成“2.png.LethalLock”,依此類推。勒索信首先承認網路實體「LETHAL LOCK」破壞了伺服器安全。它將加密過程描述為高度複雜,並警告沒有解密金鑰幾乎不可能恢復檔案。如果 72 小時內未支付贖金,它就會威脅資料永久遺失並立即採取行動。

其中包括透過 Telegram (@lethallock) 聯繫客戶支援以及轉帳 25 比特幣以獲得解密金鑰的說明。

Lethal Lock 贖金票據全文

Lethal Lock勒索信全文如下:

Oh, what an exquisite predicament has befallen you!

We take immense pleasure in informing you, without the slightest pang of regret that your server security has been breached & immortalized by LETHAL LOCK, a majestic entity in the realm of cyber command.

Marvel at the masterpiece of encryption we have orchestrated, utilizing algorithms of such complexity and military-grade standards that they render your critical documents as elusive as a mirage in the desert.

Your files now dance to the tune of an encryption algorithm so intricate, so enigmatic, that mortals tremble at its sight.

Should you dare to defy our demands, be prepared for the consequences — your data will remain locked away forever and we will sell them to a third party on the Dark Web or use them as a trade by barter on the Dark-Web to get higher upgraded tools to dismantle your organization within a twinkle of an eye.

Any futile attempts to decipher this cryptographic masterpiece, appeal to law enforcement, or seek assistance from less reputable cybersecurity entities will only hasten the irreversible disappearance of your confidential datas and the swift deletion of the decryption key.

Your enduring rule, should you choose to accept it, is to comply with our ransom payment demands within 72 hours (3days). Failure to meet this demand will result in the permanent loss of your decryption key, accompanied by a symphony of data obfuscation maneuvers that thwart even the most valiant attempts at file recovery.

To embark on this momentous path of payment and data liberation:

1) Reach out to our esteemed customer support service on Telegram: @lethallock (For those evading payment, we suggest enjoying a hot cup of coffee while witnessing the swift datas/files wipe out orchestrated by the Lethal Lock algorithms).

2) Acquire and transfer 25 bitcoins with express efficiency. Remember, our treasuries crave bitcoins, and in return, we will provide you with the coveted decryption key that unlocks the chest of digital wealth.

Follow these crucial instructions:

1) Keep your computer powered on and connected to the digital world.

2) Resist all temptations to use data recovery tools without our permission.

3) Execute the bitcoin transfer with surgical precision before the time extinguish your chance for redemption.

In your cryptographic triumph,

Van Dmitry Vladimir

Senior Director of Operations
Lethal Lock Tech Company - LLTC

如何保護您的資料免受勒索軟體攻擊?

保護您的資料免受勒索軟體攻擊需要採用多層安全方法。您可以實施以下幾種策略:

定期備份您的資料:確保您定期備份重要文件,並將其儲存在無法從主網路或系統直接存取的安全位置。這樣,如果您成為勒索軟體攻擊的受害者,您可以從備份中恢復文件,而無需支付贖金。

保持軟體更新:確保系統上的所有軟體(包括作業系統、防毒程式和應用程式)均已安裝最新的安全性修補程式。過時軟體中的漏洞可能被勒索軟體攻擊者利用。

使用防毒和反惡意軟體軟體:在您的所有裝置上安裝信譽良好的防毒和反惡意軟體軟體並保持更新。這些程式可以幫助偵測並阻止勒索軟體威脅,以免造成損害。

啟用電子郵件過濾:實施電子郵件過濾解決方案來阻止可疑電子郵件並防止它們到達您的收件匣。這有助於降低成為傳播勒索軟體的網路釣魚攻擊受害者的風險。

April 18, 2024
正在加載...

Cyclonis Backup Details & Terms

免费的基本 Cyclonis 备份计划为您提供 2 GB 的云存储空间和完整的功能!无需信用卡。需要更多存储空间?立即购买更大的 Cyclonis 备份计划!要详细了解我们的政策和定价,请参阅服务条款隐私政策折扣条款购买页面。如果您想卸载该应用程序,请访问卸载说明页面。

Cyclonis Password Manager Details & Terms

免费试用:30 天一次性优惠!免费试用不需要信用卡。免费试用期间的完整功能。 (免费试用后的完整功能需要订阅购买。)要了解有关我们的政策和定价的更多信息,请参阅EULA隐私政策折扣条款购买页面。如果您想卸载应用程序,请访问卸载说明页面。