Categories: EducationRansomware

Bitcoin Ransomware Education: Defray

A few industries are more prone to cyber attacks than others. Criminals are purposefully targeting the healthcare and education sectors as a way to improve their chances of scoring a big payday. According to Proofpoint researchers, the Defray ransomware family plays a large role in this new wave of attacks. Although there have only been two small attacks so far, there is plenty of reason to be concerned about what this ransomware family can achieve.

Defray Ransomware is a Big Problem

It was only a matter of time until cybercriminals started targeting the healthcare and education sectors again. We have seen various attacks against hospitals and schools over the past few years. Most of those ransomware distribution campaigns netted the criminals thousands of dollars, all of which was paid in Bitcoin. It now appears the criminals are back with a new tool, identified as Defray ransomware. It is quite a problematic development, even though there have only been two very small campaigns involving this malware so far.

The name “Defray” was not chosen randomly by researchers either. Though developers may have given it a different name, researchers refer to this family as Defray due to the name of the command & control server being used to communicate with the malware. This server appears to reside on the 000WebHostApp domain for the time being, although it may very well be taken down in the coming weeks. A centralized server makes it a bit easier for security researchers to combat ransomware outbreaks, even though it remains a tedious process.

So far, the distribution of this particular payload shows some intriguing and worrisome characteristics. First of all, it is distributed through Microsoft Word documents sent out through email campaigns, which is not surprising. However, we are not talking about massive waves of spam emails, but rather controlled amounts of messages. Recipients reside in the UK and the U.S. for the most part, which is pretty significant. It goes to show the developers are putting a lot of work into distributing the ransomware to their intended targets rather than going after consumers worldwide.

Related Post

Once a victim downloads and executes a Microsoft Word attachment, the malware payload will be installed on the system. The victims will see a file called FILES.TXT in virtually every folder on their computer systems, which contains information on how they can restore file access. It appears victims are asked to get in touch with the criminals via email using one of three different email addresses. There is also an option to communicate through the BitMessage application if needed.

Right now, victims are asked to make a ransom payment of US$5,000 in Bitcoin. Given the current Bitcoin price, that means they will pay slightly over 1.15 BTC. Although the Bitcoin amount itself is pretty low, a US$5,000 payment is still quite substantial for any affected company. It may be possible to negotiate a smaller amount depending on how the communication with the criminals evolves. Interestingly, the ransom note also mentions how the infected victims should maintain offline backups of their files to prevent future attacks of this magnitude. This does feel like salt in the wound for victims. 

The Defray ransomware is a professionally developed ransomware strain. It is unclear if it uses any source code from other projects which have made a name in the past. The ransom note claims that this payload is custom-tailored to infect one’s particular system, which would make it incredibly difficult to come up with a free decryption tool. It is far less obnoxious compared to most malware attacks, which also makes it a much bigger threat for enterprises and companies in specific industries. It will be interesting to see if this malware is successful in the long run, though.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

The Calculated Collapse of $TG: How a “Utility” Token Was Engineered for a Rug Pull

In the unpredictable world of cryptocurrency, new tokens launch daily, each one a shining beacon…

22 hours ago

Staked Ethereum Hits Record High as Whale Accumulation Signals Bullish Long-Term Sentiment

Once more, Ethereum is commanding the spotlight as fresh figures indicate that the amount of…

22 hours ago

Arbitrum Sees Surge in Protocol Revenue and EIP-7702 Adoption Following ArbOS 40 Upgrade

The ecosystem on Arbitrum keeps flaunting its robust foundations, with a steady incline in the…

22 hours ago

Ethereum Whale Accumulation Surges as Long-Term Confidence Outweighs Short-Term Volatility

Once again, major market players are focusing on Ethereum. The whale activity surrounding the second-largest…

4 days ago

Week in AI: Fartcoin Steals the Spotlight Amid Market Turmoil

It has been a tumultuous week for the artificial intelligence sector in crypto. Sharp valuation…

5 days ago

BSC Foundation Resumes Strategic Accumulation: VIXBT, CAKE, LISTA, and MOOLAH Under Spotlight

Following a brief stint of dormancy, the BSC Foundation is back in action, reestablishing its strategic…

6 days ago