Computer users the world over now have a new type of crypto ransomware with which to contend. GlobeImposter is a malware type spotted in the wild quite some time ago. However, compared with other types of ransomware, it has not made much of an impact until now. That may change very soon, as a new malvertising campaign has begun actively distributing this payload.
With so many different types of Bitcoin ransomware to deal with these days, it is virtually impossible to distinguish one threat from another. Victims of the Blank Slate malspam campaign will likely not have even noticed that the group behind the project has changed the ransomware they are distributing. Until a few weeks ago, the campaign mainly distributed a BTCWare ransomware variant going by the name of Aleta. Now, it is actively distributing GlobeImposter payloads.
It is unclear why this change occurred so suddenly, although it probably had to do with the BTCWare master decryption key being released several weeks ago. Like any good entrepreneur, cybercriminals have to keep up with new trends and seize any opportunities that may come their way. GlobeImposter ransomware seems to have been a more desirable payload to distribute compared to Aleta. Regardless of the ideology behind the change, the Blank Slate malspam campaign continues to harass Internet users all over the world without any sign of slowing down.
Some may wonder why this particular malspam campaign is known as Blank Slate. That is not hard to explain, since the emails sent out to users all over the world contain neither a subject nor a body. All users see is an email from an unknown email address contains a .ZIP attachment. Inside this archive is another .ZIP file containing a JavaScript. Executing this script will trigger the GlobeImposter payload download. To help stear clear of malware, never open email attachments from an unknown sender!
The GlobeImposter payload is hosted across multiple platforms. So far, two designated download locations have been identified, although it is certainly possible additional “mirrors” will be created over time. The malicious JavaScript file is pretty straightforward. Both download locations are obfuscated, but it may be possible to reveal their locations eventually. For now, it is unclear whether or not these servers are hosted on the darknet.
Once a user is infected with the GlobeImposter ransomware, he or she will observe files getting encrypted pretty quickly. That is the trend across all properly developed ransomware strains. The encrypted files will receive the .crypt file extension and require a decryption key to be restored to their original formats. Doing so is much more difficult than some people may think, and there is no free way to decrypt any version of GlobeImposter ransomware at the present time.
Victims are then asked to contact a specific email address and await further instructions. It is unclear how much money has to be paid to get rid of GlobeImposter. That amount may vary depending on the number of files that were encrypted. This is another example of ransomware developers moving away from using centralized command & control servers. This will be making it a lot harder to track down the culprit responsible for this malware.
Morgan Stanley is taking a big step into digital assets space with the launch of…
Coinbase is about to undergo one of its largest structural reorganisations in some time, with…
The suspicious DSJ Exchange (DSJEX) and BG Wealth Sharing scheme, now confirmed a Ponzi operation,…
Demand from institutions is heating up again, with U.S. spot Bitcoin ETFs logging a tally…
Western Union expands its participation in the digital asset ecosystem with USDPT, a Solana native…
The cryptocurrency sector is in the spotlight again as ZachXBT has accused decentralized exchange Tokenlon…