mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
add OSX/Shlayer and some refs
This commit is contained in:
parent
8aeed60a24
commit
2794a20589
3 changed files with 16 additions and 4 deletions
|
@ -11005,7 +11005,8 @@
|
||||||
"Attention!\n\nAll your files, documents, photos, databases and other important files are encrypted and have the extension: .KEYPASS\n\nThe only method of recovering files is to purchase an decrypt software and unique private key.\n\nAfter purchase you will start decrypt software, enter your unique private key and it will decrypt all your data.\n\nOnly we can give you this key and only we can recover your files.\n\nYou need to contact us by e-mail keypass@bitmessage.ch send us your personal ID and wait for further instructions.\n\nFor you to be sure, that we can decrypt your files - you can send us a 1-3 any not very big encrypted files and we will send you back it in a original form FREE.\n\nPrice for decryption $300.\n\nThis price avaliable if you contact us first 72 hours.\n\nE-mail address to contact us:\n\nkeypass@bitmessage.ch\n\n\n\nReserve e-mail address to contact us:\n\nkeypass@india.com\n\n\n\nYour personal id:\n[id]"
|
"Attention!\n\nAll your files, documents, photos, databases and other important files are encrypted and have the extension: .KEYPASS\n\nThe only method of recovering files is to purchase an decrypt software and unique private key.\n\nAfter purchase you will start decrypt software, enter your unique private key and it will decrypt all your data.\n\nOnly we can give you this key and only we can recover your files.\n\nYou need to contact us by e-mail keypass@bitmessage.ch send us your personal ID and wait for further instructions.\n\nFor you to be sure, that we can decrypt your files - you can send us a 1-3 any not very big encrypted files and we will send you back it in a original form FREE.\n\nPrice for decryption $300.\n\nThis price avaliable if you contact us first 72 hours.\n\nE-mail address to contact us:\n\nkeypass@bitmessage.ch\n\n\n\nReserve e-mail address to contact us:\n\nkeypass@india.com\n\n\n\nYour personal id:\n[id]"
|
||||||
],
|
],
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.bleepingcomputer.com/news/security/new-keypass-ransomware-campaign-underway/"
|
"https://www.bleepingcomputer.com/news/security/new-keypass-ransomware-campaign-underway/",
|
||||||
|
"https://www.kaspersky.com/blog/keypass-ransomware/23447/"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"KeyPass"
|
"KeyPass"
|
||||||
|
@ -11750,5 +11751,5 @@
|
||||||
"value": "LockerGoga"
|
"value": "LockerGoga"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 50
|
"version": 51
|
||||||
}
|
}
|
||||||
|
|
|
@ -1006,6 +1006,7 @@
|
||||||
"APT10",
|
"APT10",
|
||||||
"APT 10",
|
"APT 10",
|
||||||
"MenuPass",
|
"MenuPass",
|
||||||
|
"Menupass Team",
|
||||||
"happyyongzi",
|
"happyyongzi",
|
||||||
"POTASSIUM",
|
"POTASSIUM",
|
||||||
"DustStorm",
|
"DustStorm",
|
||||||
|
@ -6234,5 +6235,5 @@
|
||||||
"value": "Siesta"
|
"value": "Siesta"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 89
|
"version": 90
|
||||||
}
|
}
|
||||||
|
|
|
@ -7509,7 +7509,17 @@
|
||||||
},
|
},
|
||||||
"uuid": "0147c0fd-ed74-4d38-a823-130542d894a3",
|
"uuid": "0147c0fd-ed74-4d38-a823-130542d894a3",
|
||||||
"value": "OSX.BadWord"
|
"value": "OSX.BadWord"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "The initial Trojan horse infection (the fake Flash Player installer) component of OSX/Shlayer leverages shell scripts to download additional malware or adware onto the infected system.\nThe primary goal of OSX/Shlayer is to download and install adware onto an infected Mac.\nAlthough \"adware\" may not sound like a big deal, it can be a lot more harmful than the name implies; be sure to watch our aforementioned interview with Amit Serper to learn more about one particular example of malicious Mac adware.\nAt least one variant of the malware also appears to exhibit an interesting behavior: It checks whether one of several Mac anti-virus products is installed.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.intego.com/mac-security-blog/osxshlayer-new-mac-malware-comes-out-of-its-shell/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "6e60cb73-0bcc-45bf-b14f-633aa7ffc8b4",
|
||||||
|
"value": "OSX/Shlayer"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 108
|
"version": 109
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue