被加密后桌面被修改:
Hello daer friend!
Your files are encrypted,and , as result you can’t use it .You must visit our page to get instructions about decryption process.For futher steps y22k2-readme.txt that is located in every encrypted folder.
勒索提示文档内容:
---=== Welcome. Again. ===---
[+] Whats Happen? [+]
Your files are encrypted, and currentlyunavailable. You can check it: all files on you computer has expansion y22k2.
By the way, everything is possible to recover(restore), but you need to follow our instructions. Otherwise, you cant returnyour data (NEVER).
[+] What guarantees? [+]
Its just a business. We absolutely do not careabout you and your deals, except getting benefits. If we do not do our work andliabilities - nobody will not cooperate with us. Its not in our interests.
To check the ability of returning files, Youshould go to our website. There you can decrypt one file for free. That is ourguarantee.
If you will not cooperate with our service - forus, its does not matter. But you will lose your time and data, cause just wehave the private key. In practise - time is much more valuable than money.
2) If TOR blocked in your country, try to useVPN! But you can use our secondary website. For this:
a) Openyour any browser (Chrome, Firefox, Opera, IE, Edge)
b) Openour secondary website: http://decryptor.top/665252B5148E707D
Warning: secondary website can be blocked, thatswhy first variant much better and more available.
When you open our website, put the followingdata in the input form:
Extension name:
y22k2
-----------------------------------------------------------------------------------------
!!! DANGER !!!
DONT try to change files by yourself, DONT useany third party software for restoring your data or antivirus solutions - itsmay entail damge of the private key and, as result, The Loss all data.
!!! !!! !!!
ONE MORE TIME: Its in your interests to get yourfiles back. From our side, we (the best specialists) make everything forrestoring, but please should not interfere.
!!! !!! !!!
--------------------------------------------------------------------------------- 传播渠道:
Sodinokibi勒索病毒,又被称作a.k.a Revil和“小蓝屏”,该勒索病毒于2019年4月底首次出现,从2019年4月份到2019年11月份目前所发现的主要有以下几个渠道:
Web漏洞,曾利用 Oracle WebLogic漏洞中编号为CVE-2019-2725的漏洞。
带有链接或附件的恶意垃圾邮件或网络钓鱼活动。
使用RIG 漏洞利用工具包传播。
通过暴力破解获取到远程桌面的密码后手动投毒。并由被攻陷机器作为跳板攻击内网其它机器。
防护建议:
1. 多台机器,不要使用相同的账号和口令
2. 登录口令要有足够的长度和复杂性,并定期更换登录口令
3. 重要资料的共享文件夹应设置访问权限控制,并进行定期备份
4. 定期检测系统和软件中的安全漏洞,及时打上补丁。
5. 定期到服务器检查是否存在异常。查看范围包括:
a) 是否有新增账户
b) Guest是否被启用
c) Windows系统日志是否存在异常
d) 杀毒软件是否存在异常拦截情况
6. 安装安全防护软件,并确保其正常运行。
7. 从正规渠道下载安装软件。
8. 对不熟悉的软件,如果已经被杀毒软件拦截查杀,不要添加信任继续运行。