New Star Trek-themed Ransomware Kirk –demands Monero as Ransom

New Star Trek-themed Ransomware Kirk – Demands Monero as Ransom

Ransomware today is a major issue of concern and a threat to our PC security. As it revokes access to the user’s machine, by encrypting data and prompting victim to pay ransom to regain access.

Security today is at the forefront of any discussion. Therefore, we should keep ourselves updated with how things roll.  Spreading Ransomware is not an easy task and cyber criminals have to pay loads to bombard your mail box with phishing mails. They know that majority of their mails will fail, but there will a handful victims who will turn out ripe fruits. These victims are the targets who are real source of adding rapid cash to their illegal activities.

This year be ready to encounter more advanced Ransomware

Kirk Ransomware- Deceitful Threat

On March 16th 2017, researchers have discovered the most dreadful variant of Ransomware. It is named Kirk and is themed after most popular series Star Trek. Kirk targets 625 files types and scans C drive to encrypt specific extensions. Once the files are encrypted it adds “.kirked” as extension to the encrypted file name.

Kirk Ransomware is the first threat of its kind to ask Monero digital currency, to be paid as ransom. Compromised systems receives a note asking to transfer Monero in Monero Wallet and to write an email with your wallet address and computer name to kirk.help@scryptmail.com or kirk.payments@scryptmail.com

Note: Ransom keeps on increasing as time passes.

See Also: Top 5 Tips to Fight Against Ransomware Havoc

 How Kirk attacks?

It is not known how Kirk is distributed but researchers have seen it hiding as the network stress tool called Low Orbital Ion Cannon. Once it is executed, Ransomware generates AES key to encrypt files, and RSA-4096 to encrypt AES key. This encrypted AES key is saved in a file called pwd, needed for decryption.

how-krik-ransomware-attack

When Ransomware finishes encryption it drops a ransom, note displaying an ASCII art image of Spock and Captain followed by: “Oh no! The Kirk Ransomware has encrypted your files!”

Targeted File Extensions:

.cfr,  .ytd,  .sngw,  .tst,  .skudef,  .dem,  .sims3pack,  .hbr,  .hkx,  .rgt,  .ggpk,  .ttarch2,  .hogg,  .spv,  .bm2,  .lua,  .dff,  .save,  .rgssad,  .scm,  .aud,  .rxdata,  .mcmeta,  .bin,  .mpqe,  .rez,  .xbe,  .grle,  .bf,  .iwd,  .vpp_pc,  .scb,  .naz,  .m2,  .xpk,  .sabs,  .nfs13save,  .gro,  .emi,  .wad,  .15,  .vfs,  .drs,  .taf,  .m4s,  .player,  .umv,  .sgm,  .ntl,  .esm,  .qvm,  .arch00,  .tir,  .bk,  .sabl,  .bin,  .opk,  .vfs0,  .xp3,  .tobj,  .rcf,  .sga,  .esf,  .rpack,  .DayZProfile,  .qsv,  .gam,  .bndl,  .u2car,  .psk,  .gob,  .lrf,  .lts,  .iqm,  .i3d,  .acm,  .SC2Replay,  .xfbin,  .db0,  .fsh,  .dsb,  .cry,  .osr,  .gcv,  .blk,  .4,  .lzc,  .umod,  .w3x,  .mwm,  .crf,  .tad,  .pbn,  .14,  .ppe,  .ydc,  .fmf,  .swe,  .nfs11save,  .tgx,  .trf,  .atlas,  .20,  .game,  .rw,  .rvproj2,  .sc1,  .ed,  .lsd,  .pkz,  .rim,  .bff,  .gct,  .9,  .fpk,  .pk3,  .osf,  .bns,  .cas,  .lfl,  .rbz,  .sex,  .mrm,  .mca,  .hsv,  .vpt,  .pff,  .i3chr,  .tor,  .01,  .utx,  .kf,  .dzip,  .fxcb,  .modpak,  .ydr,  .frd,  .bmd,  .vpp,  .gcm,  .frw,  .baf,  .edf,  .w3g,  .mtf,  .tfc,  .lpr,  .pk2,  .cs2,  .fps,  .osz,  .lnc,  .jpz,  .tinyid,  .ebm,  .i3exec,  .ert,  .sv4,  .cbf,  .oppc,  .enc,  .rmv,  .mta,  .otd,  .pk7,  .gm,  .cdp,  .cmg,  .ubi,  .hpk,  .plr,  .mis,  .ids,  .replay_last_battle,  .z2f,  .map,  .ut4mod,  .dm_1,  .p3d,  .tre,  .package,  .streamed,  .l2r,  .xbf,  .wep,  .evd,  .dxt,  .bba,  .profile,  .vmt,  .rpf,  .ucs,  .lab,  .cow,  .ibf,  .tew,  .bix,  .uhtm,  .txd,  .jam,  .ugd,  .13,  .dc6,  .vdk,  .bar,  .cvm,  .wso,  .xxx,  .zar,  .anm,  .6,  .ant,  .ctp,  .sv5,  .dnf,  .he0,  .mve,  .emz,  .e4mod,  .gxt,  .bag,  .arz,  .tbi,  .itp,  .i3animpack,  .vtf,  .afl,  .ncs,  .gaf,  .ccw,  .tsr,  .bank,  .lec,  .pk4,  .psv,  .los,  .civ5save,  .rlv,  .nh,  .sco,  .ims,  .epc,  .rgm,  .res,  .wld,  .sve,  .db1,  .dazip,  .vcm,  .rvm,  .eur,  .me2headmorph,  .azp,  .ags,  .12,  .slh,  .cha,  .wowsreplay,  .dor,  .ibi,  .bnd,  .zse,  .ddsx,  .mcworld,  .intr,  .vdf,  .mtr,  .addr,  .blp,  .mlx,  .d2i,  .21,  .tlk,  .gm1,  .n2pk,  .ekx,  .tas,  .rav,  .ttg,  .spawn,  .osu,  .oac,  .bod,  .dcz,  .mgx,  .wowpreplay,  .fuk,  .kto,  .fda,  .vob,  .ahc,  .rrs,  .ala,  .mao,  .udk,  .jit,  .25,  .swar,  .nav,  .bot,  .jdf,  .32,  .mul,  .szs,  .gax,  .xmg,  .udm,  .zdk,  .dcc,  .blb,  .wxd,  .isb,  .pt2,  .utc,  .card,  .lug,  .JQ3SaveGame,  .osk,  .nut,  .unity,  .cme,  .elu,  .db7,  .hlk,  .ds1,  .wx,  .bsm,  .w3z,  .itm,  .clz,  .zfs,  .3do,  .pac,  .dbi,  .alo,  .gla,  .yrm,  .fomod,  .ees,  .erp,  .dl,  .bmd,  .pud,  .ibt,  .24,  .wai,  .sww,  .opq,  .gtf,  .bnt,  .ngn,  .tit,  .wf,  .bnk,  .ttz,  .nif,  .ghb,  .la0,  .bun,  .11,  .icd,  .z3,  .djs,  .mog,  .2da,  .imc,  .sgh,  .db9,  .42,  .vis,  .whd,  .pcc,  .43,  .ldw,  .age3yrec,  .pcpack,  .ddt,  .cok,  .xcr,  .bsp,  .yaf,  .swd,  .tfil,  .lsd,  .blorb,  .unr,  .mob,  .fos,  .cem,  .material,  .lfd,  .hmi,  .md4,  .dog,  .256,  .eix,  .oob,  .cpx,  .cdata,  .hak,  .phz,  .stormreplay,  .lrn,  .spidersolitairesave-ms,  .anm,  .til,  .lta,  .sims2pack,  .md2,  .pkx,  .sns,  .pat,  .tdf,  .cm,  .mine,  .rbn,  .uc,  .asg,  .raf,  .myp,  .mys,  .tex,  .cpn,  .flmod,  .model,  .sfar,  .fbrb,  .sav2,  .lmg,  .tbc,  .xpd,  .bundledmesh,  .bmg,  .18,  .gsc,  .shader_bundle,  .drl,  .world,  .rwd,  .rwv,  .rda,  .3g2,  .3gp,  .asf,  .asx,  .avi,  .flv,  .ai,  .m2ts,  .mkv,  .mov,  .mp4,  .mpg,  .mpeg,  .mpeg4,  .rm,  .swf,  .vob,  .wmv,  .doc,  .docx,  .pdf,  .rar,  .jpg,  .jpeg,  .png,  .tiff,  .zip,  .7z,  .dif.z,  .exe,  .tar.gz,  .tar,  .mp3,  .sh,  .c,  .cpp,  .h,  .mov,  .gif,  .txt,  .py,  .pyc,  .jar,  .csv,  .psd,  .wav,  .ogg,  .wma,  .aif,  .mpa,  .wpl,  .arj,  .deb,  .pkg,  .db,  .dbf,  .sav,  .xml,  .html,  .aiml,  .apk,  .bat,  .bin,  .cgi,  .pl,  .com,  .wsf,  .bmp,  .bmp,  .gif,  .tif,  .tiff,  .htm,  .js,  .jsp,  .php,  .xhtml,  .cfm,  .rss,  .key,  .odp,  .pps,  .ppt,  .pptx,  .class,  .cd,  .java,  .swift,  .vb,  .ods,  .xlr,  .xls,  .xlsx,  .dot,  .docm,  .dotx,  .dotm,  .wpd,  .wps,  .rtf,  .sdw,  .sgl,  .vor,  .uot,  .uof,  .jtd,  .jtt,  .hwp,  .602,  .pdb,  .psw,  .xlw,  .xlt,  .xlsm,  .xltx,  .xltm,  .xlsb,  .wk1,  .wks,  .123,  .sdc,  .slk,  .pxl,  .wb2,  .pot,  .pptm,  .potx,  .potm,  .sda,  .sdd,  .sdp,  .cgm,  .wotreplay,  .rofl,  .pak,  .big,  .bik,  .xtbl,  .unity3d,  .capx,  .ttarch,  .iwi,  .rgss3a,  .gblorb,  .xwm,  .j2e,  .mpk,  .xex,  .tiger,  .lbf,  .cab,  .rx3,  .epk,  .vol,  .asset,  .forge,  .lng,  .sii,  .litemod,  .vef,  .dat,  .papa,  .psark,  .ydk,  .mpq,  .wtf,  .bsa,  .re4,  .dds,  .ff,  .yrp,  .pck,  .t3,  .ltx,  .uasset,  .bikey,  .patch,  .upk,  .uax,  .mdl,  .lvl,  .qst,  .ddv,  .pta

Spock the Decryptor

Spock makes Star Trek theme Ransomware complete. It is a program which victim allegedly receives after paying the ransom to decrypt files.

See Also: Matrix Ransomware file-encrypting virus: Removal Guide

Monero skyrocketing currency

Launched on April 18, 2014 Monero is an open-source obscure cryptocurrency which focuses on privacy, security and is untraceable. It is the budding favorite of dark net’s and is highly touted as another entity. Monero is not another Bitcoin, it is decentralized digital currency.

What makes Monero different from Bitcoin?

Monero offers certain features that Bitcoin still can’t offer. It generates encrypted address for receiving Monero to hide sender’s identity. In addition to this, Monero creates a group where every Monero spent is grouped with as many as hundred transactions, making it untraceable thus hiding the amount of every transaction.

Monero Symbol?: ??

How to Stay Safe against Ransomware:-

No one is forbidden from Ransomware attack. Anyone can be a victim of the attack.

Experienced V/S Novice Users

Novice users are usually unaware about the threat, due to which they are less likely to know right measures to protect data. They have no idea about what is a Ransomware, how it gets into the system and what harm it can cause. This gives chance to cyber criminals to access the system and use system vulnerabilities for their benefit.

Experienced users on the other hand are much aware about such threats. They know the do’s and don’ts.

Taking regular backup of the data is a good practice to recover data when these Ransomware sting into our system.

See Also: How Businesses Can Defend Ransomware Attack

Few tips which will help you prevent such attacks:
  • Educate Users
  • Look for the security loop holes
  • Keep your systems security updated
  • Do not click on unknown e mail attachments
  • Use a good backup solution, one I can suggest is Ransomware Protector
  • Detect hidden threats
  • Don’t download files from untrusted source

To protect your friends and family against Ransomware try our Ransomware Protector. It will help to take backup of your important data on cloud by keeping it safe, with 256-bit AES encryption

Preeti Seth

Preeti is a technical writer with Systweak. She covers new technology and troubleshooting. She loves gadgets and is an avid reader. In her free time, she likes to travel and explore new places solo.

Leave a Reply

Your email address will not be published. Required fields are marked *