New Magniber Ransomware Lures Victims Via Fake Windows 10 Updates

Heads up, Windows users! A new ransomware threat has arrived to target Windows systems. Identified as “Magniber,” this ransomware poses as a fake Windows 10 update to trick users into downloading it. Users need to remain cautious as the threat is active in the wild.

Magniber Ransomware Distributes Via False Windows 10 Updates

According to a recent post from Bleeping Computer, Magniber ransomware is running active campaigns to target users.

As elaborated, the ransomware caught their attention when readers pointed out to them about catching the Magniber infection on their systems after downloading Windows 10 cumulative updates.

Analyzing the matter revealed that MAgniber ransomware targets users by posing as fake Windows 10 updates via various means. As stated in the post,

These updates are distributed under various names, with Win10.0_System_Upgrade_Software.msi [VirusTotal] and Security_Upgrade_Software_Win10.0.msi being the most common.
Other downloads pretend to be Windows 10 cumulative updates, using fake knowledge base articles

It’s currently unclear how these downloads reach victims. Yet, it seems that the threat actors predominantly disseminate them via fakewares and sites promoting cracked software.

Once reaching the target system, it starts encrypting files, renaming them by adding the “.gtearevf” extension. Also, it deletes shadow volume copies from the system. Then, it puts the ransom note as a “Readme” HTML file in every folder.

This ransom note includes the instructions for the victim to recover the “reversibly modified” files. Alongside mentioning the dark web site, the note also mentions some “temporary” links, accessible without Tor, for the victim to download the “My Decryptor” decryption tool.

The ransomware presently targets regular users and students, and not enterprise customers. Perhaps, that’s why it doesn’t demand hefty ransoms. According to Bleeping Computer, it currently asks for ~$2500 or 0.068 BTC.

For now, no safe decryptor exists for the ransomware. Nor any weaknesses of the malware are known to reverse its infection. Thus, the users need to remain careful, avoid downloading cracked versions, and use legit sites only.

Let us know your thoughts in the comments.

Related posts

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

Personal Data Exposed in Massive Global Hack: Understanding the Implications & Guarding Privacy- Axios Security Group

Guardz Welcomes SentinelOne as Strategic Partner and Investor to Boost Cybersecurity Defenses for SMBs