Frame-14

Privacy Ninja

New 0mega Ransomware Targets Businesses in Double-extortion Attacks

New 0mega Ransomware Targets Businesses in Double-extortion Attacks

A new ransomware operation named ‘0mega’ targets organizations worldwide in double-extortion attacks and demands millions of dollars in ransoms.

0mega (spelled with a zero) is a new ransomware operation launched in May 2022 and has attacked numerous victims since then.

What we know about 0mega

A ransomware sample for the 0mega operation hasn’t yet been found, therefore there’s not much information on how files are encrypted.

However, we do know that the ransomware appends the .0mega extension to the encrypted file’s names and creates ransom notes named DECRYPT-FILES.txt.

These ransom notes are customized per victim, usually containing the company name and describing the different types of data stolen in attacks. In addition, some notes include threats on how the 0mega gang will disclose the attack to business partners and trade associations if a ransom is not paid.

Also Read: What is Pentest Report? Here’s A Walk-through

These ransom notes include a link to a Tor payment negotiation site with a “support” chat that victims can use to contact the ransomware gang.

To log in to this site, victims must upload their ransom notes that include a unique Base64-encoded blob used by the site to identify the victim.

0mega ransom negotiation site
0mega ransom negotiation site
Source: BleepingComputer

Dedicated 0mega data leak site

Like almost all enterprise-targeting ransomware operations, 0mega runs a dedicated data leak site that the threat actors use to publish stolen data if a ransom is not paid.

0mega’s leak site is currently hosting 152 GB of data stolen from an electronics repair company in a May attack.

Also Read: The PDPA Data Breach August 2020: A Recap of 8 Alarming Cases

0mega data leak site
0mega data leak site
Site: BleepingComputer

However, last week there was an additional victim that has since been removed, indicating that the company may have paid a ransom.

As this is a relatively new operation, we will likely see more attacks in the future, and it is one we need to keep an eye on.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Powered by WhatsApp Chat

× Chat with us