Home Malware Programs Ransomware Gibon Ransomware

Gibon Ransomware

Posted: November 6, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 47
First Seen: November 6, 2017
OS(es) Affected: Windows

The Gibon Ransomware is a Trojan that locks all of the files on your computer, except for the contents of the Windows folder. This Trojan's campaign has various connections with Russian resources and spamming activities, although its encryption and ransoming components are compatible with Windows PCs around the world. Malware analysts recommend having your anti-malware programs vet any downloads you receive over e-mail to intercept and remove the Gibon Ransomware before it can attack your files.

What One Cybercrook can Do to You Over a Network

Despite their popularity in the Black Hat marketplace, file-locking Trojans aren't a united front of consistent design ideology. One of the sharpest divides between Trojans of this category is the use of offline or online-based attacks, with the former offering more reliability at the cost of the flexible configuration of the latter. While malware researchers have yet to come to a definitive conclusion on which approach is superior for harming computer media, the Gibon Ransomware does epitomize many of the advantages of a network-dependent Trojan.

The threat actor controls the Gibon Ransomware through means of an administrator's panel, which the Gibon Ransomware 'pings' repeatedly and makes additional, in-depth data requests for customizing its payload. These features include:

  • Every victim receives an automatic registration on the Gibon Ransomware's C&C server, which differentiates between them with a timestamp-based, Base64-encoded label.
  • A second string, also using the same encoding method, transfers back to the Gibon Ransomware and provides the majority of its 'ransom note.' Threat actors use these messages to ask for money for undoing the file-locking damages of the associated Trojan's attacks, although malware analysts have no details on payments, at the current time.
  • The Gibon Ransomware creates a key for blocking the victim's media locally, instead of acquiring one from the C&C server. However, it also transfers the key over to the threat actor.

These network activities all support the Gibon Ransomware's central function of blocking files with encryption. Although the unreadable data is identifiable through the appending of .'encrypt' extensions, the Gibon Ransomware makes this precaution almost unnecessary since it blocks everything outside of the Windows directory.

Quarantining an E-Mailed Menace

Malware researchers can verify repeated attacks trying to install the Gibon Ransomware via e-mail attachments, which may be targeting either general PC users or particular sectors of business still under determination. Scanning your downloads with appropriate security software and disabling content that's often risky, such as macros, can eliminate many of the risks of these infection vectors. If not able to prevent an attack, victims can unlock their files without paying the Gibon Ransomware's administrator by using freeware decryptors available currently.

Since malware experts see no 'offline mode' options for the Gibon Ransomware's payload, users who identify the issue in time and disconnect their online connections immediately may be able to save their files from any intended damages. However, in worst-case scenarios, the unusually wide degree of media damage that the Gibon Ransomware causes may force the user to use peripheral storage devices to regain access to the necessary security software. Modern anti-malware programs should delete the Gibon Ransomware without any issues other than the persistent data loss that's remediable with other solutions.

The average user should be thankful that the Gibon Ransomware's authors invested in their networking features significantly without putting the same time into securing its file-locking attacks. If they had done so, one's chances of retrieving anything that the Gibon Ransomware blocks could become zero easily.

Related Posts

Loading...