Wedded with A Shell of Problems

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Kim: I’m leaving, it’s time to read another script anyway.
Brian: What!? I told you, them scripts are nonsense.
Kim: Then why do we still have money in our bank account?
Photo by Keira Burton, please support by following @pexel.com

No wait, you don’t have to twist our arm! We can talk about payment options. It should be common knowledge by now that clicking on links sent to you by “someone you may know” could land you in hot water with your computer, household, work, and bank.

But you’re not the only one who has to keep an eye out for phishing emails, big name companies are getting hit and are paying the price for it… well not only paying with money but with time. 

We’re going to look at what kind of attack this is, who may have used it, what’s the functionality and effects upon its release, and some ways you can prevent this… well, at least try.

Ransomes are like this, except at the time of demand you have less money.
Photo by Tima Miroshnichenko, please support by following @pexel.com

The Attack

For those who are not familiar with ransomware attacks, we’ll quickly explain. With some phishing email attempts, sometimes depending on the threat actor’s goal, a link will be provided for you to click on.

Once you interact with the link and let’s say you downloaded a file, the malicious file can then run in the background and collect all of your data and encrypt it.

Afterward, a prompt will come up saying “We’ve collected your data and encrypted it, if you want it back then pay this amount through Bitcoin.” Usually, there is a timeframe accompanied by the prompt.

While the average person comes across this kind of attack, companies have been experiencing ransomware attacks lately and it doesn’t show any signs of stopping.

Lord, hackers get clever day by day. I’m tired.
Photo by Andrea Piacquadio, please support by following @pexel.com

Who Can It Be Now

Clop, a ransomware gang affiliate of Russia is one among many requesting payments in the highest form and has been named for using this tactic. Clop has been known to request payment in, not only hundreds, thousands, but also in the millions for companies to get their information back and kept from being released.

Clop has recently launched a ransomware campaign against a few companies claiming to have collected their data and threatening to leak it to other threat actors but the biggest among them is the gas and oil company known as Shell.

However, in most if not all cases, paying the ransom only fuels the threat actors to commit more ransomware attacks.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Kate: Who is that lady coming up behind us? Is she on the list?
Marshall: Look ahead of us, not behind us. Those days are over.
Photo by Carsten Vollrath, please support by following @pexel.com

The Sinking Feeling

Like an affair being exposed at a wedding, there are many factors that lead up to this event. A complex approach is becoming a part of the organization, working hard to rise in the ranks and gain a high enough level of privilege to access where sensitive data is being kept and installing malicious malware onto their systems.

The other and least complex is spear-phishing or even whale-phishing. Whale-phishing is aimed for someone like the CEO of the organization while spear-phishing is aimed for certain personnel who may have the level of privilege needed to fall victim to the ransomware attack.

Once a target has been chosen and unfortunate enough to not pay attention to the ongoings of clicking on the provided link, a number of actions are set in motion.

A file or folder holding the malware is downloaded onto the machine. That malware is then released and depending on its program it could either collect the data and encrypt it or copy the collected data, encrypt it, and delete the files leaving behind empty files and directories.

Once information aggregation is complete, whatever is collected is sent back to a command and control (C2C) server for the threat actor to decide what is important and what they would like to do with the information.

So, yeah, this is like having the side chick show up on your wedding day when you’re just trying to get married. The moral of the story is; don’t have a side chick if you care about keeping your information secret.

You’d be surprised, a good chunk of time hacking takes place in a GUI rather than the command line.
Photo by Sora Shimazaki, please support by following @pexel.com

The Prevention

Now, don’t panic, there are some ways you can prevent this. Since most of the time this is done by phishing attempts, practicing examining emails, and looking for things like questionable grammar, grammar Nazis this is where you can shine with your superpower and people will love you.

The option for you to hover your mouse over the link and see where it would take you is there although I won’t really suggest this as some people may be heavy-handed and accidentally click on the link.

Copying and pasting the link into Google’s search engine could also help id if the link is legit or not. If you do click on the link and are redirected to a website, leave immediately and pay attention to your downloads as visiting the website may have a drive-by download—this is where a download happens without your interaction, if this happens delete the files immediately and scan the computer. Keeping the antivirus software, OS (Operating System), and employee awareness training up to date will help ensure ransomware attacks are kept at bay.

Security isn’t a hundred percent guaranteed but not having something in place guarantees a hundred percent chance of an infection.

A little security is better than no security at all.
Photo by Travis Saylor, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on ransomware attacks? Script a comment below.

Ransom, Malwares & Joseph

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

someone writing in a notebook
Pen pals were the old school catfishing back in the day.
Photo by lil artsy, please support by following @pexel.com

Hey, do you remember the time when you could check the email that you had gotten from a random stranger and have nothing to worry about? Like the thought of you and them becoming pen pals was a possibility.

No, of course, no one would think that way since we’re all trained, due to our parents from a young age to stay away from strangers. However, let’s say that you did, and you were curious as to how this random chance of friendship would play out.

You email each other back and forth and things are going swell, right up until you get a notification saying, “You have twenty-two hours to hand over $65,356.34 if you want any chance of getting your computer back to normal and your dirty little secrets from being exposed.” This scenario isn’t exactly how the attack plays out, but you get the idea, your pseudo-friend has dirt on you and wants you to pay up or else.

two men sat across from each other.
Jake: I’m going to make you an offer you can’t refuse.
Steve: I refuse.
Jake: Okay, I didn’t see that coming so quickly. Oh gosh, you didn’t even think about it.
Photo by cottonbro studio, please support by following @pexel.com

You got Blockbuster

So back in 1989, hot movies were being released like Road House, Batman, and Indiana Jones and the Last Crusade, and the internet was booming. There was the raise of AOL or what’s better known as America Online, the movie The Godfather had been out for some years before then and people were drawing inspiration from the famous line that most jobs and now what seems like the current stance of every landlord, utility service provider, or insurance company are saying, “I’m going to make you an offer you can’t refuse.” Someone who may have taken inspiration from this movie was Joseph L. Popp.

A Harvard-trained evolutionary biologist who was the first person ever to create a ransomware virus. For those who don’t know, ransomware is a type of malware that acquires the victim’s information and denies access until the demands are met. These demands could be sending money, demanding the “truth” if it’s an activist act, or sending nudes. That last one was silly but I’m sure there’s some hacker out there using ransomware on Only Fans accounts for nudes.

Along with the creation of ransomware came interesting names such as “AIDS Trojan” and “PC Cyborg”. Popp made like capitalism and capitalized on the AIDS epidemic by sending out 20,000 infected diskettes labeled “AIDS Information” to people of the World Health Organization or widely known as W.H.O.

a photo of a diskette
Most if not all people of today have no clue what this is. Let me introduce you to the diskette.
Photo by Pixabay, please support by following @pexel.com

The diskettes housed malicious code able to hide file directories, lock file names, and demand victims send $189 to a PO Box in Panama to get their information back. This was the first generation of ransomware, and things have become more advanced since then.

man looking evil with a glass of scotch.
I drink, code viruses, and know things…for the right price.
Photo by cottonbro studio, please support by following @pexel.com

Father of Ransoms

After Joseph was deemed “The Father of Ransomware”, what category of people came to follow in his footsteps, not only to use but later improve this malware? They are called hackers and just a side note; anyone can use malware making them cyber-attackers, but I’m going to use hackers since their main objective is to exploit for profit.

Hackers tend to use ransomware via various methods such as phishing emails with malicious files attached, and drive-by downloading – a method where a file is downloaded without your interaction. And finally spoofing – is another method where a hacker is posing as a trusted entity.

Hackers can often obtain Ransomware-as-a-Service (RaaS) or malware-for-hire which has easier use and is cost-efficient for performing ransomware attacks. This is insane because this means hackers actually have a budget created to perform cyber-attacks. There are several ransomware variants, some of which could have you buck-naked out in the cold (or heat, depending on when and where you’re at in the world).

Popular ones are Ryuk – delivered through spear-phishing emails or gaining access to a desktop remotely, this variant can encrypt certain files avoiding the crucial ones for the computer’s operation and presenting the demand for ransom.

Ryuk can account for an average of $1 million. Maze can combine file encryption and data theft, this is done with the intent that if the victim decides not to pay the ransom their information could be exposed, sold online, or both.

REvil also known as Sodinokibi is a variant that has large organizations on the menu. This variant has been responsible for a number of large data breaches, a couple being “Kaseya” and “JBS” and has been known to have demanded a ransom of $800,000.

Lockbit, operating since September 2019, this variant rapidly encrypts data to prevent detection by security appliances and SOC (System and Organization Control) teams. There are a couple of other variants but at this junction, you pretty much get the point, they get access to your information, lock you out, and hold it for ransom.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

man sat holding his face.
What makes you think I can pay this ransom when I can’t even pay my rent?
Photo by Wallace Chuck, please support by following @pexel.com

Payments Not Made

Being hit with a ransomware attack is insanely dangerous and many vital organizations such as hospitals and public services have experienced significant losses from it as not paying the ransom can halt access to critical care.

Paying the ransom can lead to a chain reaction of events, a few being loss of the money used in ransom payment, productivity time lost, and the need to hire IT for disaster and recovery. And choosing not to pay the ransom could lead to whatever consequences the hacker has set in place.

So, how do you stop your information from being held against you? Well, there are a number of ways, most of which are pretty basic and get overlooked every day since we’re all creatures of habit.

Avoid clicking on links sent via email or other messaging means, staying away from compromised websites, ones where you may get a warning from your browser which displays “This site is not secure and may be unsafe, turning back is recommended.” Heed this warning as it may save you and your computer from being hit with a drive-by download.

And the most likely out of the bunch, if you suffer from being attracted to shiny things as I do, are ads that may pop up on your screen. A malicious link could be hidden within the ad to redirect you to an un-secure site for some non-consent time for your computer.

person sat with a mask in a hoodie holding a bank card.
Subscribe today so you or someone you know doesn’t have to experience ransomware or I will gain access to all your secrets.
Photo by Tima Miroshnichenko, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you think there’s something I missed on ransomware and want to add? Script a comment below.

Filing MatchBox 20 Error

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

We’re not MatchBox 20 but we’re good enough!
Photo by Thibault Trillet, please support by following @pexel.com

Oh boy, if you’re a Matchbox 20 fan, you might not be too thrilled about this one. The cyber world has been going crazy with ransomware attacks, and it seems like every day there’s a new victim of some nasty malware that leaves them twerking for Jesus until the next payday.

With the addition of ransomware bearing the name of one the most popular songs from the beloved 2000s, which isn’t cool at all and has us realizing it’s 3 AM and that even we are feeling quite lonely.

We are going to look at what is this attack, who is using it, what are the effects upon release, and what are some ways you prevent yourself from being kept up until 3 AM.

Why does this god-awful thing keep going off at 3 in the morning!?
Photo by Miriam Alonso, please support by following @pexel.com

The Attack

If you have been gone for some time, then maybe it’s time to come back home and find out what strain of ransomware is on the market as of late. To quickly cover what ransomware is for those who might not know, ransomware is a type of malware that encrypts your data and threatens to expose it or delete it unless you pay a ransom.

This is on par with finding your boss in a nightclub when they called out sick that day and you video them to later use as leverage for a bigger paycheck. Blackmailing aside, this strain of ransomware is named “3 AM”, not for the reason you may think. It’s not set to go off at 3 in the morning to collect your information.

Its name derives from its file extension displayed as “.threeamtime”. This is added to all encrypted files changing them from “one.jpg” to “one.jpg.threeamtime”. In case 3 AM fails to influence its victim into making a payment it’s paired with LockBit, which is another ransomware that can spread across networks and lock down devices.

Guys, you are aware hackers don’t actually look like me right? Why are you profiling?
Photo by lil artsy, please support by following @pexel.com

Who Can It Be Now

No threat actors have been named for using 3 AM ransomware but according to cybersecurity experts, it is possible that multiple threat actors are using this malware for various purposes.

So, if you receive a message saying that your data has been encrypted and you need to access the dark web to negotiate a ransom and it’s your first time. Welcome to some hard truths which are don’t count on getting a real name, your ransom being a fixed price, or getting your data restored.

Also, enjoy your stay, despite it being the dark web where the most illegal activities like hacking, drug trafficking, and selling people’s information take place, the dark web may have candy. And who doesn’t like candy?

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

I am here to steal nothing, I promise.
Photo by Anna Shvets, please support by following @pexel.com

That Sinking Feeling

Speaking of candy, how would someone end up with a problem like this, you may be wondering. One of the various ways that ransomware can infect your computer is through phishing emails.

Posing as a legitimate source, such as a company or an organization, they could ask you to click on a link or download an attachment. For example, you may receive an email from Hacking-U-Made-Fun Inc. that says, “Please click on the link provided for you, and confirm the documents attached.”

However, when you click on the link or download the attachments, you are actually installing malware onto your computer. The malware then ventures off to encrypt all files (depending on its coding) and demands payment to restore them.

This is on par with someone breaking into your house, putting a lock on the fridge, and demanding you pay $5,000 in Bitcoin to take the lock off.

Cop: spread em!
Guy: Hey, you ever heard Scriptingthewhy?
Cop: No.
Guy: They’re pretty great, they talk about cybersecurity and stuff.
Cop: That’s great, you’re still going to jail. But I’ll grab the link from you at booking.
Photo by Kindel Media, please support by following @pexel.com

The Prevention

Wondering how to prevent this? The foolproof way is to never interact with it in the first place, but security is never 100% and if anyone is offering 100% security, you should run the other way.

There are steps that could be taken to minimize encountering 3 AM and LockBit. Some security practices are to be cautious when opening email attachments, especially from unknown or suspicious senders.

Updating your operating system and anti-virus/malware regularly will help you detect and remove 3 AM and other threats. Avoid downloading software from untrusted sources or using third-party installers because these may run the chance of bundling 3 AM and other malware. And trust when we say, you don’t want this a part of your album.

Subscribe now or the next time we meet, I’ll charge you more than just the food in your fridge.
Photo by Anna Shvets, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on 3AM ransomware? Script a comment below.