Servers Webhosting

Login
Join now, it's FREE!
Get Notifications
/ Categories RSS Subscribe NOW!
1.1.webhosting 5g adobe.company adobe.player affiliate.market affiliate.webhos ai ai.in.threat.det ai.models alerta amanda antivirus.softwa apache app.store.fees apple arch artificial.intel australia backup.soluiton backup.solutions backup.system backup.tools backuppc bacula bad.webhosting bareos.backup barman.data.reco beginner.s.guide benefits best.python.libr big.data binance bkex.suspension blade.server101 blockchain blogging bonded.adsl bored.ape.justin bup burp.backup business business.ai.vc-b business.blockch business.cloud.h business.intelli business.start-u business.vr.ar.a businesses ccna.certificati ccnp.certificati chatgpt cheap.webhosting check.mk china cisco clean.energy clean.energy.rac cloud.business cloud.computing cloud.failure.pr cloud.hosting cloud.server clustering clustering.techn coding computer.clustri computer.protect connection.pooli corona.virus cpanel cpanel.cons cpanel.hosting cpanel.pros cpanel.reseller cpanel.tutorial cpanel.unlimited cpu.performance creating.strong crypto.punk cryptocurrency cyber.security cyber.threats cybersecurity cybersecurity.ri dangerous.cyber data-exposed data.backup data.mining data.recovery data.scientists data.synchroniza ddos ddosia.attack decentralized dedicated.hostin dedicated.server dedicated.webhos defend.against.c degrees descentralized.i developer.freedo django dns.resolution domain.registrat donald.trump.nft dreamhost duplicity earn.money ecommerce.webhos efficient.and.cl electric.cars email.account email.support emerging.cyber.t error essential.linux firewall.rules flapjack fluhorse fortify.smart.ho free.webhosting freefilesync fuel.efficient.c gamer.server.pro games.nvidia golang good.webhosting google google.apps gpus green.energy hack-resistant.p hacker.attack hmtl hongkong hostgator hosting hosting.benefits how.to.use.linux how.to.use.pytho html html-smuggling hydrogen.fuel.ce inhouse.server internet.of.thin iot jpm.coin kali.linux laundering.inves letmespy linkedin linux linux.commands linux.guide linux.installtio linux.reseller.h linux.webhosting literature.surve load.balancing load.balancing.t load.test lsyncd malware manged.hosting manjaro maxcdn meta-analysis metamask metaverse minecraft minecraft.server miniorange mobile.app mobile.security money monitoring.tools multiple.server mysql.cluster natural.gas natural.gas.2023 nethunter nft nvidia ohio-blockchain online.security openssh opportunity optimization overselling password.securit payments personal.compute pfsense phishing.attacks plattforms preventing.hacke programming.lang protect.confiden protect.your.cha protect.yourself proxy python.for.begin python.for.data python.for.machi python.libraries python.web.devel renewable.energy reseller.hosting restic review ruby.on.rails runner.software safeguard.confid sec.sues.binance secret.tricks.fo secure.wifi semiconductors seo server.basic server.clusterin server.downtime server.hosting server.license server.virtualiz shared.hosting shared.webhostin shockbyte single.server smartphone.secur snebu social.marketing social.media social.networkin software.develop softwares solar.array sql.server ssl.certificate sub.domain.confi swap switch.webhostin system.adminstra tablet.security technology technology.ntfli tesla tether tutorial twiter twitter.technolo urbackup virtual.machine virtual.server virtualization virtualization.t vps vps.providers vps.server vps.webhosting vulnerabilities vulnerability web.3.0 web.design web.development web.hosting web.hosting.supp web.load.balanci web.mangement web.server web.toolset web3 webhosting webhosting.coupo webhosting.featu webhosting.photo webhosting.plan webhosting.resel webserver webserver.log website windows windows.computer windows.reseller windows.server windows.server.2 windows.server20 wireless woocomerce wordpress wordpress.featur wordpress.hostin worldcoin worldcoin.crypto xfce yahoo zbackup zero-day.attacks zero-emission.en

RedEnergy Stealer: A New Ransomware Threat to the Energy and Telecom Sectors RSS
0

RedEnergy Stealer: A New Ransomware Threat to the Energy and Telecom Sectors

"Beware of the New RedEnergy Ransomware That's Targeting Energy and Telecom Companies"


Meta Description: New RedEnergy Ransomware Targets Energy and Telecom Companies, Stealing Sensitive Data and Encrypting Files


linkedin-threat

Jul 7, 2023

A new ransomware threat dubbed RedEnergy has been spotted in the wild targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines through their LinkedIn pages.

The malware, which is not to be confused with the Australian company Red Energy, is a stealer-as-a-ransomware (StAR) threat. This means that it is designed to steal sensitive data from its victims before encrypting their files.

How RedEnergy Works

RedEnergy is distributed through fake browser update campaigns. Once it is installed on a system, it will steal information from a variety of sources, including:

  • Web browsers (Chrome, Firefox, Edge, Opera)

  • Email clients (Outlook, Thunderbird)

  • Password managers (LastPass, 1Password)

  • Crypto wallets

  • File-sharing services (Dropbox, Google Drive)

After stealing this data, RedEnergy will encrypt the victim's files using the AES-256 encryption algorithm. The encrypted files will be suffixed with the ".FACKOFF!" extension.

The attackers then demand a ransom of 0.005 BTC (about $151) in exchange for the decryption key.

How to Protect Yourself from RedEnergy

There are a few things you can do to protect yourself from RedEnergy:

  • Be careful about what links you click on and what attachments you open.

  • Keep your software up to date.

  • Use a firewall and antivirus software.

  • Back up your data regularly.

If you think you have been infected with RedEnergy, you should:

  • Disconnect from the internet.

  • Do not pay the ransom.

  • Contact a cybersecurity professional for help.

Additional Details About RedEnergy

  • The malware is written in .NET and is obfuscated to make it more difficult to analyze.

  • It uses HTTPS to communicate with its command and control servers, which makes it more difficult to block.

  • It has a number of different modules that allow it to steal a wide variety of data, including:

    • Web browser history

    • Email addresses and passwords

    • Credit card numbers

    • Crypto wallet keys

  • The ransom note that is displayed to victims is typically written in English, but it can also be translated into other languages.

  • The attackers behind RedEnergy are still active and have been observed targeting new victims in recent weeks.

Tips for Protecting Yourself from RedEnergy

  • Be suspicious of any emails or attachments that you receive from unknown senders.

  • Do not click on links in emails unless you are sure they are legitimate.

  • Keep your operating system and software up to date with the latest security patches.

  • Use a firewall and antivirus software to protect your computer from malware.

  • Back up your data regularly so that you can restore it if it is encrypted by ransomware.

Conclusion

RedEnergy is a serious threat that should be taken seriously. By following the tips above, you can help protect yourself from this threat.

I hope this article helps you stay safe from RedEnergy and other ransomware threats.

Sources:

RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom Sectors


Extra Tags:

  • RedEnergy

  • stealer-as-a-ransomware (StAR) threat

  • fake browser update campaigns

  • web browsers

  • email clients

  • password managers

  • crypto wallets

  • file-sharing services

RedEnergy Stealer: A New Ransomware Threat to the Energy and Telecom Sectors RSS
0