Monday, March 27, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Cyber-readiness and Changing Federal Government SBOM Requirements
  • Survey Surfaces Need to Change SecOps Priorities
  • Streaming Services and Cybersecurity
  • Threat Spotlight: Generative AI
  • USENIX Security '22 - 'QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore'
Data Security SBN News Security Bloggers Network 

Home » Cybersecurity » Data Security » New Phobos Ransomware Using Same Ransom Note as Dharma

SBN

New Phobos Ransomware Using Same Ransom Note as Dharma

by David Bisson on January 21, 2019

A new strain of ransomware known as “Phobos” is using the same ransom note employed by Dharma to demand payment from its victims.

TechStrong Con 2023Sponsorships Available

Ransomware incident response provider Coveware found that Phobos’ ransom message differs from Dharma’s only in the branding used for its header and footer. Otherwise, the notes are exactly the same.

The ransom note for Phobos. Its branding differences with Dharma are circled in red. (Source: Coveware)

Both crypto-malware strains also use the same encrypted file name format. They each incorporate the original file name, a unique ID number and an attacker’s email to construct encrypted file names. Phobos’ note ends this name with the .phobos file extension, while Dharma is known to have leveraged numerous file extensions including .xxxxx, .like., .java, .bip, .combo, .arrow, .arena and .gamma.

That’s not the only similarity Phobos shares with Dharma, either. The two ransomware families use the same cut-and-paste response when a victim first contacts the digital attackers using an email address provided in the ransom note. Additionally, both of the emails offer a unique “service” to its victims in order to make even more money from potential victims. As quoted by Coveware in a blog post:

we also offer service to you. full of advice for protecting against attacks? – the price of 0.1 BTC, and remember our work is very hard. and it requires a lot of time and costs.

To Coveware’s knowledge, no victim has taken up the attackers on this offer as of yet.

The two ransomware families do differ from one another in some respects, however. As noted by ransomware researcher Michael Gillespie on Bleeping Computer’s support forums, the filemakers for the two crypto-malware strains do in fact differ in structure.

Phobos has been active since mid-December 2018, and it’s likely this (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/new-phobos-ransomware-using-same-ransom-note-as-dharma/

January 21, 2019January 21, 2019 David Bisson Dharma, IT Security and Data Protection, Latest Security News, Phobos, Ransomware
  • ← Angry ex-employee blamed for hack of WordPress plugin developer, and email to customers warning of security hole
  • BSides Delaware 2018, Brandon S. Keath’s ‘Introduction To Ethical Hacking’ →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

Is Trafficking in Hacking Information a Crime?
Using Deception to Learn About Russian Threat Actors
Phishing, Brute Force Attacks Rise in Expanded Threat Landscape
Modern Cybersecurity Problems Need Next-Gen PAM Solutions
Business Email Compromise Threats Soar Past Phishing Risks
USENIX Security ’22 – ‘QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore’
Top Data Breaches in 2022 and 2023 Point to Increases in Phishing and Ransomware
Throwing Caution to the Wind: The Challenges of Securing Wind Power
The Power of Open-Source Security: A Deep Dive
Using ChatGPT to Improve API Security: Open AI & Security

Upcoming Webinars

Apr 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Apr 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Apr 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Apr 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Apr 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Apr 20

Lessons From a Live Hack: Secure Your Cloud From the Inside

April 20 @ 3:00 pm - 4:00 pm
Apr 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | Mar 17 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Survey Surfaces Need to Change SecOps Priorities
Analytics & Intelligence CISO Suite Cloud Security Cybersecurity Data Security Featured Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

Survey Surfaces Need to Change SecOps Priorities

March 27, 2023 Michael Vizard | 3 hours ago 0
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences
Analytics & Intelligence Application Security Cybersecurity Featured Identity & Access Network Security News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence 

Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences

March 27, 2023 Michael Vizard | 9 hours ago 0
Cybersecurity Leaders Stressed Over Email Security
Application Security Cloud Security Cybersecurity Endpoint Featured Mobile Security Network Security News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Cybersecurity Leaders Stressed Over Email Security

March 21, 2023 Nathan Eddy | Mar 21 0

Security Humor

Randall Munroe’s XKCD ‘Relative Terms’

Randall Munroe’s XKCD ‘Relative Terms’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.