Most high profile ransomware attacks follow the same playbook. Malware is installed on a system and encrypts certain folders and files. To access the files again, hapless users have to pay a fee to the hackers and hope they receive an unlock code in return. It’s a mugging, updated for the 21st century.
But there’s no intrinsic reason hackers have to demand money. They might request anything from nude photos (which might hilariously backfire, depending on which businesses were initially infected) to Amazon gift cards. And in one memorable case, a black hat is demanding that people play PUBG to unlock their files, Bleeping Computer reports.
Another top quality ransomware that asks you to play a game to decrypt files: "PUBG Ransomware".Sample: https://t.co/qyEHMG2orLExtension: .PUBGThis sample only encrypts files on desktop (including subdirectories)…@BleepinComputer @demonslay335 pic.twitter.com/5406DPbwmX
— MalwareHunterTeam (@malwrhunterteam) April 9, 2018
The only files encrypted are those on your desktop. As malware goes, this one is pretty lightweight. While the program claims to monitor your PUBG playing time, there’s no need to actually play for an hour — starting the executable for just three seconds is apparently enough to begin the decryption process. You don’t even actually need to play PlayerUnknown’s Battlegrounds. Rename any executable TSLGame.exe, run that, and the unlock process begins again. And the app even includes an unlock code that’ll let you reverse the encryption process without playing the game.
On the surface, this reads more like a silly prank than a serious attempt to extort people. After all, it doesn’t even work particularly well. But this kind of activity could have a genuine dark side. Instead of encrypting files for cash, hackers could request people perform seemingly small tasks that installed malware to their system to exfiltrate additional data.
If you’ve surfed the net for any length of time, you’ve probably encountered pop-up ads that insist you need to install a certain plugin or application to view content. Chain that attack vector to ransomware, and people might willingly compromise their own machines. Infected machines could then be leveraged in botnet attacks or have their data exfiltrated.
And that, of course, is just the tip of the iceberg. We’ve already seen how companies are willing to game systems to improve product sales, to the point that certain people have gotten products from Amazon that they never ordered, just to generate verified sales for reviews on the site. To the best of our knowledge, ransomware hasn’t been used for this kind of scam yet, but it could be. Want to drive page views or YouTube video plays? Fold it into a ransomware attack. When you ask for $5,000, people balk. If you ask them to watch a video, they’d be more likely to click the link, hit Play, and go pour a cup of coffee.
This time it was PUBG. Next time… next time, it could be Nickelback.
May God have mercy on our souls.
Nvidia Goes All-In On G-Sync With New ‘BFGD’ Ultra-High-End Displays
Nvidia is bringing some of the highest-end displays imaginable to market in 2018, with 4K panels, 120Hz refresh rates, low latency displays, integrated Nvidia Shields, and support for 1,000 nits of brightness in HDR. Yowza.
Vivo Demos First Smartphone With In-Display Fingerprint Sensor
At CES, Chinese smartphone maker Vivo is on hand to show off the first ever phone with a fingerprint reader inside the display.
This Is Your Brain On Electrodes: Nissan’s ‘B2V’ Driver-Skill Amplifier
Nissan's B2V technology — brain-to-vehicle — captures and decodes the driver's brain waves. It can give the car up to a half-second advance notice of the driver's intentions.