News

Microsoft warned about the dangers of PonyFinal ransomware

Microsoft warned organizations about the dangers of the PonyFinal ransomware, which attacks have already been recorded in India, Iran and the United States.

Malware is based on Java and is used for attacks that manually direct PonyFinal statements. That is, hackers break into corporate networks and manually place ransomware there, and do not distribute the encryptor automatically, through mail spam or exploit kits, as is usually the case.

“Typically, the invasion point is the account on the system management server, where PonyFinal operators invade with the help of brute force attacks and the selection of weak passwords. On the server, the hackers deploy a Visual Basic script that runs the PowerShell reverse shell to collect and steal data”, — say Microsoft researchers.

Having invaded the network of the target company, the attackers spread the infection to other local systems, and then they introduce the PonyFinal ransomware itself. In most cases, hackers attack workstations on which the Java Runtime Environment (JRE) is installed, since PonyFinal is written in Java.

However, Microsoft experts note that they also recorded cases where the group independently installed JRE in the victims’ systems before launching the ransomware.

Files encrypted using PonyFinal usually have the extension .enc. The PonyFinal encryption scheme is considered reliable, as currently there are no ways and available tools to decrypt the affected data.

Ponyfinal Attack Scheme

According to information security experts Michael Gillespie and MalwareHunterTeam, the PonyFinal ransomware appeared earlier this year, and so far few companies have suffered from its activity, which only confirms the theory that PonyFinal is used in targeted attacks on carefully selected targets.

Emsisoft specialist Michael Gillespie notes that users, which uploaded malware samples to ID-Ransomware for identification were from India, Iran, and the United States.

According to Microsoft, PonyFinal is on the short list of ransomware managed by live operators. Recently, such malware has been repeatedly used against organizations from the health sector, despite the current pandemic of the coronavirus, as was did, for example, Maze ransomware.

In addition to PonyFinal, this list includes: RobbinHood, NetWalker, Maze, REvil (Sodinokibi), Paradise, MedusaLocker and LockBit.

And live operators also rule RagnarLocker, which uses virtual machines to hide its activities.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
James Brown

Technology news writer and part-time security researcher. Author of how-to articles related to Windows computer issue solving.

Recent Posts

Remove Nuesobatoxylors.co.in pop-up ads (Virus Removal Guide)

Nuesobatoxylors.co.in is a domain that tries to trick you into subscribing to its browser notifications…

45 mins ago

Remove Helistym.xyz pop-up ads (Virus Removal Guide)

Helistym.xyz is a site that tries to force you into clik to its browser notifications…

51 mins ago

Remove Topsafeguardcenter pop-up ads (Virus Removal Guide)

Topsafeguardcenter.com is a site that tries to force you into clik to its browser notifications…

22 hours ago

Remove Hatteesaid.live pop-up ads (Virus Removal Guide)

Hatteesaid.live is a domain that tries to trick you into subscribing to its browser notifications…

22 hours ago

Remove Fujivista.top pop-up ads (Virus Removal Guide)

Fujivista.top is a domain that tries to force you into subscribing to its browser notifications…

22 hours ago

Remove Zambaadsmedia.azurewebsites.net pop-up ads (Virus Removal Guide)

Zambaadsmedia.azurewebsites.net is a domain that tries to trick you into subscribing to its browser notifications…

1 day ago