Most high profile ransomware attacks follow the same playbook. Malware is installed on a system and encrypts certain folders and files. To access the files again, hapless users have to pay a fee to the hackers and hope they receive an unlock code in return. It’s a mugging, updated for the 21st century.
But there’s no intrinsic reason hackers have to demand money. They might request anything from nude photos (which might hilariously backfire, depending on which businesses were initially infected) to Amazon gift cards. And in one memorable case, a black hat is demanding that people play PUBG to unlock their files, Bleeping Computer reports.
Another top quality ransomware that asks you to play a game to decrypt files: "PUBG Ransomware".Sample: https://t.co/qyEHMG2orLExtension: .PUBGThis sample only encrypts files on desktop (including subdirectories)…@BleepinComputer @demonslay335 pic.twitter.com/5406DPbwmX
— MalwareHunterTeam (@malwrhunterteam) April 9, 2018
The only files encrypted are those on your desktop. As malware goes, this one is pretty lightweight. While the program claims to monitor your PUBG playing time, there’s no need to actually play for an hour — starting the executable for just three seconds is apparently enough to begin the decryption process. You don’t even actually need to play PlayerUnknown’s Battlegrounds. Rename any executable TSLGame.exe, run that, and the unlock process begins again. And the app even includes an unlock code that’ll let you reverse the encryption process without playing the game.
On the surface, this reads more like a silly prank than a serious attempt to extort people. After all, it doesn’t even work particularly well. But this kind of activity could have a genuine dark side. Instead of encrypting files for cash, hackers could request people perform seemingly small tasks that installed malware to their system to exfiltrate additional data.
If you’ve surfed the net for any length of time, you’ve probably encountered pop-up ads that insist you need to install a certain plugin or application to view content. Chain that attack vector to ransomware, and people might willingly compromise their own machines. Infected machines could then be leveraged in botnet attacks or have their data exfiltrated.
And that, of course, is just the tip of the iceberg. We’ve already seen how companies are willing to game systems to improve product sales, to the point that certain people have gotten products from Amazon that they never ordered, just to generate verified sales for reviews on the site. To the best of our knowledge, ransomware hasn’t been used for this kind of scam yet, but it could be. Want to drive page views or YouTube video plays? Fold it into a ransomware attack. When you ask for $5,000, people balk. If you ask them to watch a video, they’d be more likely to click the link, hit Play, and go pour a cup of coffee.
This time it was PUBG. Next time… next time, it could be Nickelback.
May God have mercy on our souls.
Intel’s Desktop TDPs No Longer Useful to Predict CPU Power Consumption
Intel's higher-end desktop CPU TDPs no longer communicate anything useful about the CPUs power consumption under load.
VIA Technologies, Zhaoxin Strengthen x86 CPU Development Ties
VIA and Zhaoxin are deepening their strategic partnership with additional IP transfers, intended to accelerate long-term product development.
Intel Launches New Xe Max Mobile GPUs for Entry-Level Content Creators
Intel has launched a new consumer, mobile GPU — but it's got a very specific use-case, at least for now.
Nvidia Unveils ‘Grace’ Deep-Learning CPU for Supercomputing Applications
Nvidia is already capitalizing on its ARM acquisition with a massively powerful new CPU-plus-GPU combination that it claims will speed up the training of large machine-learning models by a factor of 10.