X
Tech

New Spider ransomware threatens to delete your files if you don't pay within 96 hours

Attackers behind new ransomware campaign are offering a "really easy" tutorial video in order to ensure they make money from their criminal activities.
Written by Danny Palmer, Senior Writer

A new form of ransomware has emerged and is being distributed through malicious Office documents, infecting victims with file-encrypting malware.

Uncovered by researchers at Netskope, the 'Spider Virus' ransomware campaign was first detected on December 10 and is ongoing.

Like many ransomware schemes, the attack begins with malicious emails to potential victims. The email subjects and the lure documents indicate the attackers are keen on targeting victims in the Balkans. It's currently unknown where the attackers are operating from.

The malicious Microsoft Office attachment contains obfuscated macro code which -- if macros are enabled -- allows a PowerShell to download the first stage of the ransomware payload from a host website.

Following this, the PowerShell script decodes the Base64 string and performs operations to decode the final payloads in an .exe file -- which contains the Spider ransomware encryptor.

PowerShell then launches the encryptor, encrypting the user's files, adding a '.spider' extension to them and then displaying a ransom note.

The note tells the victim they've been infected with the Spider Virus and that they need to make a bitcoin payment for "the right key" in order to get their files back.

The attackers also issue a threat that if the payment isn't received within 96 hours, their files will be deleted permanently. They add victims shouldn't "try anything stupid" as the ransomware has "security measures" which delete the files if the victim tries to retrieve them without paying the ransom.

spider-ransomware-note.png

The Spider ransomware note is available in two languages.

Image: Netskope

An additional note provides the victim with instructions on how to download the Tor browser required to access the payment site, how to generate a decryption tool, and how to purchase bitcoin.

See also:Ransomware: An executive guide to one of the biggest menaces on the web

"This may seem complicated to you, actually it's really easy", the note says -- adding that there's also a video tutorial inside a 'help section'. It's common for ransomware distributors to provide this sort of 'service' to victims, because if the victims can't pay the ransom, the criminals won't make money from their campaign.

spider-help-video.png

The attackers behind Spider offer a tutorial video to victims to ensure that they can buy bitcoin to pay the ransom.

Image: Netskope

The Spider ransomware is still being distributed in what researchers refer to as a "mid-scale campaign".

As well as educating employees about the danger of ransomware and backing up critical files, businesses can protect themselves from becoming infected by Spider -- and many other forms of file-encrypting malware -- by removing macros, which are used as an attack vector.

"In addition to disabling macros by default, users must also be cautious of documents that only contain a message to enable macros to view the contents and also not to execute unsigned macros and macros from untrusted sources," said Netscope's Amit Malik.

Because Spider is a brand new form of ransomware, there's currently no free decryption tool available for victims to retrieve files.

Recent and related coverage

Ransomware's bitcoin problem: How price surge means a headache for crooks

Ransomware authors are profiting from the rise of the cryptocurrency -- but it's also bringing some unexpected problems for them and other dark web operators.

Ransomware: Security researchers spot emerging new strain of malware

'Magniber' ransomware could potentially be an experiment by people behind the Cerber ransomware family.

This ransomware-spreading botnet will now screengrab your desktop too

New payload bundled within Necurs botnet attacks allows those carrying out malicious campaigns to check if they're working and improve updates.

READ MORE ON CYBERCRIME

Editorial standards