www.itfunk.orgwww.itfunk.orgwww.itfunk.org
  • Home
  • Tech News
    Tech NewsShow More
    LogoFAIL Vulnerabilities Expose UEFI Security Risks: Urgent Solutions Needed
    3 Min Read
    malware, adware
    Win64/NSudo!MSR: Safeguarding Against Exploited Legitimate Components
    3 Min Read
    ‘400 Bad Request’ Error: Troubleshooting Tips and Prevention Strategies
    4 Min Read
    Zimbra Email Software Vulnerability: Understanding, Mitigating, and Preventing Cyber Threats
    8 Min Read
    AdLoad Malware: Threat Analysis, Removal Guide, and Prevention Measures (MAC)
    4 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
    How To GuidesShow More
    ConnectionCachefid: Removing Adware Threats from Your Mac
    2 Min Read
    Your Search Bar Me: Browser Hijacking and Prevention Guide
    3 Min Read
    Removing Bitacco.com Ads and Similar Threats
    5 Min Read
    Mfxtradevip.com – A Potential Hazard: How to Remove and Avoid Similar Threats
    4 Min Read
    Mayorhotdogs.uno Pop-up Ads: Removal Guide and Threat Insights
    3 Min Read
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    IT/Cybersecurity Best PracticesShow More
    ConnectionCachefid: Removing Adware Threats from Your Mac
    2 Min Read
    Your Search Bar Me: Browser Hijacking and Prevention Guide
    3 Min Read
    Removing Bitacco.com Ads and Similar Threats
    5 Min Read
    Mfxtradevip.com – A Potential Hazard: How to Remove and Avoid Similar Threats
    4 Min Read
    Mayorhotdogs.uno Pop-up Ads: Removal Guide and Threat Insights
    3 Min Read
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org. All Rights Reserved.
Reading: Phobos Ransomware: the encryption ransomware threat that came from the Dharma and Crysis ransomware families
Share
Notification Show More
Font ResizerAa
www.itfunk.orgwww.itfunk.org
Font ResizerAa
  • Tech News
  • How To Guides
  • Cyber Threats
  • Product Reviews
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org All Rights Reserved.
www.itfunk.org > Blog > Cyber Threats > Ransomware > Phobos Ransomware: the encryption ransomware threat that came from the Dharma and Crysis ransomware families
IT/Cybersecurity Best PracticesRansomware

Phobos Ransomware: the encryption ransomware threat that came from the Dharma and Crysis ransomware families

ITFunk Research
Last updated: 2023/10/23 at 7:22 PM
ITFunk Research
Share
Phobos Ransomware: the encryption ransomware threat that came from the Dharma and Crysis ransomware families
SHARE

Phobos Ransomware is an encryption ransomware threat that was first observed on October 21, 2017. While Phobos ransomware technically emerged after the infamous Dharma and Crysis ransomware families, it reuses significant chunks of their code. Phobos ransomware has been used to target computer users in Western Europe and the United States and delivers its ransom messages in English to the victims.

One of the methods in which Phobos ransomware is being distributed is through the use of spam email attachments, which may appear as Microsoft Word documents that have enabled macros. These macro scripts are designed to download and install the Phobos ransomware onto the victim’s computer when the malicious file is accessed. Although most initial reported instances of Phobos ransomware were traced to email links and attachments, there has been a pronounced shift towards exploiting exposed Remote Desktop Protocols. Employing the use of scanners, hackers search for computers and networks running unsecured RDP connections. This allows them to escalate their privileges, collect user login credentials, gain lateral access inside the compromised network before delivering the ransomware payload. 

Like most other, similar threats, Phobos ransomware works by encrypting the victim’s files by using a strong encryption algorithm. The encryption makes the files inaccessible, allowing Phobos ransomware to take the victim’s data hostage until the victim pays a ransom. Phobos ransomware will target the user-generated files, which may include files with the following extensions:

.mp3, .mp4, xls, .xlsx, .zip, .jpeg. And many others

In late 2018, a prolific cybercrime gang behind a series of ransomware attacks was distributing a new form of Phobos ransomware that combined two well-known and successful variants in a series of attacks against businesses around the world.

The demand is made in a ransom note, and aside from an ominous ‘Phobos’ logo being added to the ransom note, it’s basically the same as the note used by it’s predecessor Dharma ransomware.

The note in part reads:

All your files have been encrypted!

All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail fileb@protonmail.com

Write this ID in the title of your message

In case of no answer in 24 hours write us to this e-mail: back7@protonmail.ch

You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.

While the vast majority of ransomware threats out there rely on spam email campaigns to reach targeted PCs, Phobos ransomware has brought about a marked shift towards exploiting exposed Remote Desktop Protocols (RDPs) instead. By using readily available scanners, the cybercrooks in charge scour entire networks for unsecured active RDP connections, then retrieve the necessary login credentials by way of a brute-force attack before planting the ransomware payload. Dharma ransomware did this, and so does Phobos ransomware. 

This infection method is currently enjoying great popularity for two main reasons. First, millions of RDP connections remain unprotected to this day despite the tremendous efforts made by security companies worldwide to raise awareness about the underlying risks. Second, the Dark Web provides abundant opportunities for hackers willing to lay their hands on thousands of stolen remote access credentials. One of the dark marketplaces offering such data – xDedic – shuttered on Jan. 24, 2019 after an international joint operation involving law enforcement agencies from the United States, Germany, Belgium and Ukraine seized its domains and servers. 

Contrary to other malware strains, Phobos ransomware does NOT bypass Windows’ User Account Control (UAC) feature. That is why, the UAC pop-up will come up asking for permission to “allow the following program from an unknown publisher to make changes to this computer.” Should the targeted PC user select ‘Yes,’ Windows will no longer be able to prevent the program or process from running. Instead, Phobos ransomware will launch with elevated privileges and will install itself in the system’s AppData folder. Last, but not least, Phobos ransomware will modify the targeted machine’s registry settings in order to launch during system startup. 

Data Loss Mitigation

As far as recovering your data after an outbreak of Phobos ransomware, according to Research from Data Security Consultants Coveware, “While the total data recovery rate is ~85%, there are also instances of no decryption tool being delivered after payment. The data success rate (when a decryptor is delivered) is relatively high despite the logistical complexity of receiving decryption keys and running the decryption tool.”

So as you can see, even if you pay the hackers, there is no guarantee you will be able to recover your files after infection.

In other words, the only way to guarantee you won’t lose your data is to prevent the initial infection.

If you are still having trouble, consider contacting remote technical support options.

You Might Also Like

ConnectionCachefid: Removing Adware Threats from Your Mac

Your Search Bar Me: Browser Hijacking and Prevention Guide

NanoFile.gqa: Mac Browser Hijacking and Removal Guide

Addressing the JAWR Ransomware Infection: Protecting Your System and Restoring Files

Managing the JAZI Ransomware Infection: Safeguarding Your System and Recovering Files

TAGGED: Best Practices, Ransomware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Copy Link Print
Share
Previous Article Maryland’s efforts to criminalize the mere possession of malware
Next Article CygnusOlor Malicious Extension: A Comprehensive Overview, Threats, Removal, and Prevention
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

Pdfsuperhero.com Ads: Safeguard Your Mac from Intrusive Browser Threats
Adware Browser Hijackers Mac Malware
GlobalProcesserfld: Protecting Your Mac from Adware Invasion
Adware Mac Malware
ConnectionCachefid: Removing Adware Threats from Your Mac
Adware Browser Hijackers How To Guides IT/Cybersecurity Best Practices Mac Malware
Removing Boost Audio Extension: Safeguarding Your Mac from Adware
Adware Mac Malware
//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Support

Sign Up for Our Newesletter

Subscribe to our newsletter to get our newest articles instantly!

 

www.itfunk.orgwww.itfunk.org
© 2023 www.itfunk.org. All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
Welcome Back!

Sign in to your account

Lost your password?