Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Wildfire Ransomware Operators Made $80,000 in One Month

Wildfire, a recently observed piece of ransomware targeting mainly users in Belgium and the Netherlands, has generated roughly $80,000 in payments for its operators in just a month, Intel Security and Kaspersky Lab researchers reveal.

Wildfire, a recently observed piece of ransomware targeting mainly users in Belgium and the Netherlands, has generated roughly $80,000 in payments for its operators in just a month, Intel Security and Kaspersky Lab researchers reveal.

The malware managed to infect over 5,300 systems within 31 days prior to Aug 23, 2016, for a total of 5,768 infections, Intel researchers say. They also note that 236 people paid the ransom, which resulted in the ransomware’s operators earning 136 Bitcoin (~$80,000) in one month.

However, the amount could have been larger, but it appears that Wildfire’s operators allowed victims to pay only one third of the demanded ransom. While the ransom note in the malware informed users that a 1.5 Bitcoin payment was necessary to regain access to the encrypted documents, most victims paid only between 0.5 and 0.6 Bitcoins, it seems.

The Wildfire ransomware is distributed via spam emails claiming that a transport company failed to deliver a package and that a form that can be downloaded which needs to be filled to schedule a new delivery.

A few days before the spam campaign started, the perpetrators registered the Dutch domain name they use for malware distribution, and the spam message is written in flawless Dutch, accorridng to Kaspersky Lab researchers. What’s more, the cybercriminals also put the address of the targeted company in the email–a tactic used to trick users into believing that the email is genuine.

The purported form the user has to download is a Word document that contains malicious macros, and the victim is prompted to enable macros to view its content. As soon as the macros are enabled, the Wildfire ransomware (consisting of three files, namely Usiyykssl.exe, Ymkwhrrxoeo.png, and Iesvxamvenagxehdoj.xml) is downloaded and executed on the victim’s computer.

Wildfire, researchers say, is very similar to the Zyklon ransomware: they both use three files, target mainly users in the Netherlands, and both increase the amount the victim has to pay three-fold after a specific period of time. According to researchers, Wildfire is most likely an affiliate-based ransomware-as-a-service (RaaS) operated by Russian criminals, given that the malware would avoid infecting users in several countries, namely Russia, Ukraine, Belarus, Latvia, Estonia and Moldova.

After infection, the ransomware calls back to the command and control (C&C) server, where information such as the IP, username, rid and country are stored. The malware terminates itself if the “rid” is not found or the victim lives in one of the blacklisted countries. Otherwise, it starts encrypting user’s files using AES in CBC mode.

Advertisement. Scroll to continue reading.

Although Wildfire is a local threat, it shows a lot of dedication from its operators, and researchers say that the malware is effective and evolving. At the moment, a decryption tool is available for the ransomware’s victims, meaning that they can restore their files without paying the cybercriminals. At the moment, the tool includes 1,600 keys for Wildfire, but more will be added soon, researchers say.

Related: Cerber Ransomware-as-a-Service Generates $2.3 Million Annually: Report

Related: Shade Ransomware Updated With Backdoor Capabilities

Related: DetoxCrypto Ransomware Sends Screenshots to Operators

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.