Bitcoin Ransomware Education – XData

It looks like the ransomware threat is only becoming more prominent over time. XData, a recently discovered type of malicious software, is causing a lot of problems in the Ukraine. Hundreds of computers have been infected successfully, and a lot of the victims were forced to pay the ransom. It is evident to the people behind this ransomware strain are trying to make their presence known.

Number of XData Infections Grows Exponentially

Security researchers all over the world are growing concerned over what the XData ransomware strain represents. To be more specific, the malicious software was spotted earlier this week. However, it seems the developers and distributors are upping their game. The number of successful infections across the Ukraine is four times higher compared to WannaCry. That is quite an amazing – and troublesome – feat.

To be more specific, no one knows for sure why this type of malicious software is growing so omnipresent all of a sudden. Considering how the Ukraine was the fifth-most affected target of WannaCry ransomware, it is remarkable XData infected four times as many computers. What is even stranger is how the software did so in such a short amount of time. This goes to show computers in this country have a serious security issue.

As if that isn’t enough to worry about, it appears XData is the second–most distributed ransomware over the past 24 hours. It is only marginally behind Cerber, which remains a very real threat that needs to be addressed sooner or later. It also appears the ransomware is now spreading to neighboring countries, as incidents have been reported across Russia, Germany, and Estonia. This is not a positive development by any means, though.

Related Post

Similar to a lot of other ransomware types, XData uses AES encryption and renames file extensions to something more custom. As part of its encryption process, XData goes after local files and unmapped network shares. This type of behavior has become more prevalent among malicious software types as of late. Criminals want to cause as much damage as possible, after all.

Moreover, anyone infected with XData will need to contact the developers via email before they receive payment instructions. This type of behavior has also become quite popular as of late. Criminals no longer link Tor-based URLs for the payment page, but rather prefer to do things via email. This also means we have no idea how big the ransom is for the victims, although it is possible the number is somewhere close to the $250 range.

For the time being, getting rid of XData ransomware without paying the ransom or restoring files from a backup is virtually impossible. Security experts are analyzing the ransomware sample they obtained to reverse-engineer the software, but that process can take quite some time. It will be interesting to see if XData makes its way to other countries in the future, although it seems likely that will happen sooner or later.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

9 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

1 day ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

1 day ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

2 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

3 days ago

Polygon Raises Network Capacity To 140M Gas

Polygon has made a big move in cementing its mission as one of the leading…

4 days ago