Experts warn of the new 0mega ransomware operation
BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide.
0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported.
The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations.
Victims of the ransomware reported that the malware adds the .0mega extension to the encrypted file’s names and creates for each victim a customized ransom note named DECRYPT-FILES.txt.
The operators behind this ransomware is some cases included in the ransom note details on how to disclose the attack to business partners and trade associations in case the victim will not pay the ransom.
Like other ransomware gangs, the operators use a payment negotiation site hosted on the Tor network.
Victims can contact the operators via the negotiation site by uploading the ransom note dropped on their systems, obviously the note includes a unique identifier.
The researchers Andrew Ivanov, who worked with Lawrence Abrams, published a blog post that includes details about the ransomware.
BleepingComputer confirmed that at the time of their report, the researchers have yet to find a 0mega sample.
Follow me on Twitter: @securityaffairs and Facebook
|
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
The post Experts warn of the new 0mega ransomware operation appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.