No sooner was Cyberpunk 2077 released for Windows and consoles than we came across a “beta version for Android” online. It was completely free to download from a site bearing the name cyberpunk2077mobile[.]com. The game’s actual developer has yet to announce any mobile version of the game, so we show more ...
decided to investigate. Cyberpunk 2077 for Android? No, it’s ransomware The website for the alleged mobile version looks nothing like Cyberpunk 2077‘s official site — it looks more like Google Play, in fact. Its creators claim the beta version was released on the same day as the official release, and (at the time of this post) had been downloaded about 1,000 times. Some users had even left feedback, saying it wasn’t bad for a beta version. Shades of Google Play Although the website lists the app’s size at 3.4GB, the file is less than 3MB. Did the developers also create some kind of futuristic compression technology on the side? Not likely. Moving along, on its initial run, the fake beta requests access to files on the device. In theory, an app might need some file access to save or open something, but no game needs your photos and videos just to load. Nevertheless, this app will not run without the permission. If a user grants that permission, however, they will see a ransom demand, not the game they wanted. Why does a game need access to your files? To encrypt them, of course! The message is in rather garbled English, and it informs the victim that all of their selfies and other important files are now encrypted. To recover them, the cybercriminals demand $500 in bitcoin within 24 hours. (Or 10 hours. The ransom note mentions both periods.) Anyway, the note continues, if the victim doesn’t deliver the money in time, the malware will permanently erase everything. According to the note, any attempt to remove the ransomware will be futile and result in the loss of the files. Are the encrypted files recoverable? We checked to see what really happens to the files on an infected device. The files are indeed encrypted and assigned the extension .coderCrypt. In addition, the malware places a README.txt file, containing the same ransom message, in each folder. The fake Cyberpunk 2077 for Android does encrypt files — its creators are honest about that part However, the files are recoverable. That’s because the malware uses the RC4 symmetric encryption algorithm. The symmetric part means the same key both encrypts and decrypts the files. In this case, the key was hard-coded into the app, and in all of the samples that we encountered, it was this: 21983453453435435738912738921. Because RC4 is quite common, it is possible to recover the files for yourself, for example, by using an online RC4 decryption service or contacting our user support team. What’s more, at least for the version of the malware we examined, the 10- (or 24-) hour deadline is completely irrelevant. The ransomware won’t delete anything after a time — its code contains no such function. That said, saving a copy of the encrypted files before attempting to restore them is worth your time, just in case the recovery utility fails. Cyberpunk 2077 ransomware: Windows version Regrettably, files encrypted by ransomware are not always easy to recover. For example, the authors of the fake beta Cyberpunk 2077 for Android are also distributing ransomware for Windows disguised as the same game. In that case, however, the key is not hard-coded into the app, but randomly generated for each infection case, so victims have no easy way to decrypt affected files. The ransom note for Windows users demands $1,000 in bitcoin for decryption Should you pay up? At the time of this writing, more than $8,000 in bitcoin had been transferred to the cybercriminals’ wallet. Meanwhile, file recovery is in no way guaranteed. The ransomware creators might simply disappear with the money or, finding victims willing to pay, demand more. Therefore, we strongly advise against paying the ransom. Kaspersky experts help ransomware victims by studying malicious code and inventing ways to decrypt files — in other words, we write free decryptors. You can find many of them on the NoMoreRansom website, created specially to counter such attacks, or on our support website. If you do get hit by ransomware, make those resources your first port of call. Even if no decryptor exists for your particular problem yet, it is possible, even likely, that one will appear in due course with a corresponding utility. How to stay safe from ransomware The best tip, obviously, is to avoid ransomware in the first place — even ransomware temptingly disguised as a popular game. To protect yourself, observing basic digital hygiene may suffice. Download apps only from official stores or from the developer’s official website. Scan for news of beta versions, releases, and promotions on the developer’s website. If the developer has no information, or the game is not officially out yet, anything else is fake. Use a reliable security solution on all devices to catch malware before it can do any harm. For example, our products nail the fake–Cyberpunk 2077 ransomware for Android with the verdict HEUR:Trojan-Ransom.AndroidOS.Agent.bs, and the version for Windows as Trojan-Ransom.Win32.Alien.ao. Back up important files so you can recover them promptly in case of damage or loss.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory to warn organizations using industrial control systems (ICS) about the risks posed by these flaws.
The UK's Ministry of Justice (MoJ) reported 17 serious data breaches during the last financial year, according to official figures analyzed by the Parliament Street think tank.
Multiple security researchers note the return of an email campaign attempting to spread the malware, which is often used to drop the Ryuk ransomware and Trickbot banking Trojan.
Of those who were offered training, 82% claimed that it was a short briefing rather than something more comprehensive. Less than a fifth (17%) said they had regular training sessions.
The three services were active at insorg.org [2014 snapshot], safe-inet.com [2013 snapshot], and safe-inet.net before the domains were seized and replaced with law enforcement banners on Monday.
Indian Institute of Technology Jodhpur and WhizHack Technologies Private Limited signed an MoU to build a Centre of Excellence (CoE) for new innovations in cyber security, AI and IoT.
Joker’s Stash, a popular carding site where cybercriminals trade their payment-card wares, has suffered a blow after law enforcement apparently seized one of its domains.
Roanoke College, a private liberal arts college located in Salem, Virginia, has delayed their spring semester by almost a month after a cyberattack has impacted files and data access.
The FBI advises people to first search for vaccine distribution info on your state health department's website to make sure that you don't fall for the scammers' fraud attempts.
According to Sygnia, the Golden SAML technique involves attackers first gaining administrative access to an organization's ADFS server and stealing the necessary private key and signing certificate.
In this scam, the cybercriminals were using stolen Messenger passwords to phish for yet more Messenger passwords by sending messages that genuinely seemed to come from friends and family.
Today’s typical six-layer enterprise technology stack consists of networking, storage, physical servers, as well as virtualization, management, and application layers, which increases security challenges.
The company leaked 12 million records on patients including highly sensitive diagnoses, before the exposed cloud server was struck by the infamous “meow” attacker, researchers have revealed.
U.S. House Intelligence Committee chairman Adam Schiff on Tuesday asked for a briefing from U.S. agencies about a widespread hack of U.S. government networks and potential vulnerabilities.
The Funke media group said the attack affected numerous computer systems at editorial offices and printing plants across the country, and prevented the publishing of its Wednesday editions.
The US Department of Homeland Security has published a "business advisory" today warning US companies against using hardware equipment and digital services created or linked to Chinese companies.
Data related to COVID-19 medicines and vaccines was the target of a cyberattack earlier this month, and the hackers accessed documents belonging to third parties, the regulator said.
While tracking the Lazarus group’s campaigns targeting various industries, Kaspersky found that they recently went after COVID-19-related entities, including a pharma firm and a government ministry.
The FBI and the Department of Homeland Security have concluded that Iran is very likely behind a website apparently aimed at inciting violence against election officials as well as the FBI director.
The Jefferson County Property Valuation Administrator's office has been hit by a ransomware attack, in which hackers are holding the agency's data hostage, PVA Colleen Younger said in an interview.
The Iranian-backed Fox Kitten hacking group is suspected to be behind the nefarious acts of Pay2Key ransomware that began a new wave of attacks in November-December 2020.
Cybercriminals lock down networks for one simple reason: it's the quickest and easiest way to make money from a compromised organization and they're unlikely to get caught.
Texas-based SolarWinds told the U.S. Securities and Exchange Commission (SEC) that its executives were not aware that the company had been breached when they decided to sell stock.
Energy Secretary Dan Brouillette, DOE’s Chief Information Officer Rocky Campione, and NNSA CIO Wayne Jones all participated in the briefings to the relevant congressional oversight bodies.
Federal officials dropped a holiday gift for cybersecurity managers across the government: the draft remote user use case for the latest iteration of the Trusted Internet Connection, or TIC, policy.
CVE-2020-0986, which was exploited in the wild, was not fixed. The vulnerability still exists, just the exploitation method had to change. A low integrity process can send LPC messages to splwow64.exe (Medium integrity) and gain a write-what-where primitive in splwow64’s memory space. The attacker controls the destination, the contents that are copied, and the number of bytes copied through a memcpy call.
Asterisk Project Security Advisory - A crash can occur in Asterisk when a SIP 181 response is received that has a Diversion header, which contains a tel-uri.
Asterisk Project Security Advisory - A crash can occur in Asterisk when a SIP message is received that has a History-Info header, which contains a tel-uri. Note, the remote client must be authenticated, or Asterisk must be configured for anonymous calling in order for this problem to manifest.
Multiple themes from the WordPress Epsilon Framework suffer from an unauthenticated function injection vulnerability that allows for server-side request forgery and denial of service attacks.
The US Federal Bureau of Investigation (FBI) and Interpol have allegedly seized proxy servers used in connection with Blockchain-based domains belonging to Joker's Stash, a notorious fraud bazaar known for selling compromised payment card data in underground forums. The takedown happened last week on December 17. The operators of Joker's Stash operate several versions of the platform, including
The US Cybersecurity Infrastructure and Security Agency (CISA) has warned of critical vulnerabilities in a low-level TCP/IP software library developed by Treck that, if weaponized, could allow remote attackers to run arbitrary commands and mount denial-of-service (DoS) attacks. The four flaws affect Treck TCP/IP stack version 6.0.1.67 and earlier and were reported to the company by Intel. Two of
As if the exponential rise in phishing scams and malware attacks in the last five years wasn't enough, the COVID-19 crisis has worsened it further. The current scenario has given a viable opportunity to cybercriminals to find a way to target individuals, small and large enterprises, government corporations. According to Interpol's COVID-19 Cybercrime Analysis Report, based on the feedback of 194
The FBI, working with law enforcement agencies across Europe, have seized three web domains and the server infrastructure used by a VPN service to allegedly help cybercriminals compromise networks around the world, and evade detect by police. Read more in my article on the Hot for Security blog.