Most high profile ransomware attacks follow the same playbook. Malware is installed on a system and encrypts certain folders and files. To access the files again, hapless users have to pay a fee to the hackers and hope they receive an unlock code in return. It’s a mugging, updated for the 21st century.
But there’s no intrinsic reason hackers have to demand money. They might request anything from nude photos (which might hilariously backfire, depending on which businesses were initially infected) to Amazon gift cards. And in one memorable case, a black hat is demanding that people play PUBG to unlock their files, Bleeping Computer reports.
Another top quality ransomware that asks you to play a game to decrypt files: "PUBG Ransomware".Sample: https://t.co/qyEHMG2orLExtension: .PUBGThis sample only encrypts files on desktop (including subdirectories)…@BleepinComputer @demonslay335 pic.twitter.com/5406DPbwmX
— MalwareHunterTeam (@malwrhunterteam) April 9, 2018
The only files encrypted are those on your desktop. As malware goes, this one is pretty lightweight. While the program claims to monitor your PUBG playing time, there’s no need to actually play for an hour — starting the executable for just three seconds is apparently enough to begin the decryption process. You don’t even actually need to play PlayerUnknown’s Battlegrounds. Rename any executable TSLGame.exe, run that, and the unlock process begins again. And the app even includes an unlock code that’ll let you reverse the encryption process without playing the game.
On the surface, this reads more like a silly prank than a serious attempt to extort people. After all, it doesn’t even work particularly well. But this kind of activity could have a genuine dark side. Instead of encrypting files for cash, hackers could request people perform seemingly small tasks that installed malware to their system to exfiltrate additional data.
If you’ve surfed the net for any length of time, you’ve probably encountered pop-up ads that insist you need to install a certain plugin or application to view content. Chain that attack vector to ransomware, and people might willingly compromise their own machines. Infected machines could then be leveraged in botnet attacks or have their data exfiltrated.
And that, of course, is just the tip of the iceberg. We’ve already seen how companies are willing to game systems to improve product sales, to the point that certain people have gotten products from Amazon that they never ordered, just to generate verified sales for reviews on the site. To the best of our knowledge, ransomware hasn’t been used for this kind of scam yet, but it could be. Want to drive page views or YouTube video plays? Fold it into a ransomware attack. When you ask for $5,000, people balk. If you ask them to watch a video, they’d be more likely to click the link, hit Play, and go pour a cup of coffee.
This time it was PUBG. Next time… next time, it could be Nickelback.
May God have mercy on our souls.
Ransomware Scammers Get Scammed Themselves By Tor Proxy Hack
Ransomware payments are being diverted via a man-in-the-middle attack, which is some sort of perverse justice. Still, it won't do the original ransomware victims any good.
Ransomware Groups Now Threatening to Release Stolen Data If Businesses Don’t Pay
The cybercriminals behind the Maze Ransomware have set up a website where they have pledged to reveal which companies don't "work with [them]" to recover data.