Embedded C# Ransomware
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The unnamed tool is delivered via a malware dropper, although it is unclear how this is distributed to users. This dropper contains an encrypted string and a hard-coded key. When decrypted this string contains the source code for the malware. It is believed this method is used to prevent detection of the dropper by security products.
The C# code is then compiled and begins an encryption process targeting all available local files. Filenames are converted to hexadecimal and prepended with the phrase 'sequre.io[Filename]_'.
Remediation steps
| Type | Step |
|---|---|
|
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 17 February 2020 12:42 pm