Sodinokibi勒索病毒家族详解-转载

分享到:

2019-11-24 21:00:50


相关阅读:
Sodinokibi勒索病毒样本分析,我是链接请点我。


勒索病毒家族名称:Sodinokibi
是否支持解密: 

详情:
被加密文件:被加密文件后缀为随机后缀。



被加密后桌面被修改:
Hello daer friend!
Your files are encrypted,and , as result you can’t use it .You must visit our page to get instructions about decryption process.For futher steps y22k2-readme.txt that is located in every encrypted folder.





勒索提示文档内容:
---=== Welcome. Again. ===---

[+] Whats Happen? [+]

Your files are encrypted, and currentlyunavailable. You can check it: all files on you computer has expansion y22k2.
By the way, everything is possible to recover(restore), but you need to follow our instructions. Otherwise, you cant returnyour data (NEVER).

[+] What guarantees? [+]

Its just a business. We absolutely do not careabout you and your deals, except getting benefits. If we do not do our work andliabilities - nobody will not cooperate with us. Its not in our interests.
To check the ability of returning files, Youshould go to our website. There you can decrypt one file for free. That is ourguarantee.
If you will not cooperate with our service - forus, its does not matter. But you will lose your time and data, cause just wehave the private key. In practise - time is much more valuable than money.

[+] How to get access on website? [+]

You have two ways:

1) [Recommended] Using a TOR browser!
  a)Download and install TOR browser from this site: https://torproject.org/
  b) Openour website:http://aplebzu47wgazapdqks6vrcv6 ... on/665252B5148E707D

2) If TOR blocked in your country, try to useVPN! But you can use our secondary website. For this:
  a) Openyour any browser (Chrome, Firefox, Opera, IE, Edge)
  b) Openour secondary website: http://decryptor.top/665252B5148E707D
Warning: secondary website can be blocked, thatswhy first variant much better and more available.
When you open our website, put the followingdata in the input form:


Key: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Extension name:
y22k2
-----------------------------------------------------------------------------------------
!!! DANGER !!!
DONT try to change files by yourself, DONT useany third party software for restoring your data or antivirus solutions - itsmay entail damge of the private key and, as result, The Loss all data.
!!! !!! !!!
ONE MORE TIME: Its in your interests to get yourfiles back. From our side, we (the best specialists) make everything forrestoring, but please should not interfere.
!!! !!! !!!
---------------------------------------------------------------------------------
传播渠道:
    Sodinokibi勒索病毒,又被称作a.k.a Revil和“小蓝屏”,该勒索病毒于2019年4月底首次出现,从2019年4月份到2019年11月份目前所发现的主要有以下几个渠道:
  • Web漏洞,曾利用 Oracle WebLogic漏洞中编号为CVE-2019-2725的漏洞。
  • 带有链接或附件的恶意垃圾邮件或网络钓鱼活动。
  • 使用RIG 漏洞利用工具包传播。
  • 通过暴力破解获取到远程桌面的密码后手动投毒。并由被攻陷机器作为跳板攻击内网其它机器。

防护建议:
1.        多台机器,不要使用相同的账号和口令
2.        登录口令要有足够的长度和复杂性,并定期更换登录口令
3.        重要资料的共享文件夹应设置访问权限控制,并进行定期备份
4.        定期检测系统和软件中的安全漏洞,及时打上补丁。
5.        定期到服务器检查是否存在异常。查看范围包括:
a)        是否有新增账户
b)        Guest是否被启用
c)        Windows系统日志是否存在异常
d)        杀毒软件是否存在异常拦截情况
6.        安装安全防护软件,并确保其正常运行。
7.        从正规渠道下载安装软件。
8.        对不熟悉的软件,如果已经被杀毒软件拦截查杀,不要添加信任继续运行。


如果需要沟通,可联系我,我的手机号18910108696,微信同号
声明:此篇为用友服务中心文章,转载请标明出处链接:
  • 相关文章
  • 热门下载
  • 数据修复
  • 热门标签
合作伙伴