Categories: EducationRansomware

Getting Infected With Goldeneye Ransomware Will Set You Back US$2,000

Ransomware remains one of the biggest threats to computer users all over the world. Even though a lot of people have become more aware of these problems, and taken the necessary precautions, it is impossible to prevent some malicious software from slipping by. Goldeneye ransomware is a perfect example of how things can get out of hand pretty quickly.

Goldeneye Ransomware Distribution Taken To A New Level

To put all of this into perspective, most people are well aware of how criminals attempt to distribute ransomware on a large scale. Spamming campaigns, malvertising, and malicious application downloads are the three most common methods of doing so. As users protect themselves against the threats, they are mostly successful in staying infection-free.

But some of us still tend to behave in such a way that we regard not getting a ransomware infection more luck than skill or precaution. Being careful in an online environment is one thing, but even the best of us can fall victim to malicious software. A new spam campaign targeting German users goes to show how cautious Internet users can still be tricked into downloading an infected file.

Everyone in the world has downloaded an email attachment that turned out to be nothing special. Every time that happens, there is a risk of getting a malware infection. The German spam campaign in question attaches two attachments to every email. To most users, this will look less suspicious than just one attachment, for some unknown reason.



Related Post

As one would come to expect, only one attachment contains the Goldeneye ransomware payload. Since one of the attached files is a PDF related to a job position, it is not unlikely to think that most people will open that file to see what it is all about. The other file is an excel sheet which users need to fill in with personal information to reply to the application. This is where the magic happens, and the payload installation is triggered.

Once the Goldeneye ransomware payload is downloaded, it will be running in the background from that moment onwards. Computer files will be encrypted, leaving behind several files explaining what has happened. But there is a twist, as Goldeneye goes beyond traditional file encryption to encrypt the Master File Table of hard drives as well. Without the MFT, a hard drive is turned into something that cannot be repaired by any means.

Paying the Bitcoin ransom demand is not a viable option at this stage since users will be forced to pay twice, first to recover the MFT, and then to decrypt the locked files. Right now, it appears   that users will ask for about US$2,000 in Bitcoin to get rid of both encryption locks, which is quite a steep price.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

10 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

1 day ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

1 day ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

2 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

3 days ago

Polygon Raises Network Capacity To 140M Gas

Polygon has made a big move in cementing its mission as one of the leading…

4 days ago