{"id":1766,"date":"2016-12-07T18:27:41","date_gmt":"2016-12-07T17:27:41","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=1766"},"modified":"2022-04-06T01:11:55","modified_gmt":"2022-04-05T23:11:55","slug":"petya-mischa-ransomware-variant-goldeneye","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2016\/12\/07\/petya-mischa-ransomware-variant-goldeneye\/","title":{"rendered":"Petya-Mischa Ransomware variant GoldenEye"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"http:\/\/www.borncity.com\/blog\/2016\/12\/07\/ransomware-goldeneye-zielt-auf-personalabteilungen\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Petya-Mischa ransomware seems to return as \"GoldenEye\", hitting German companies. Currently the e-mail spam campaign spreading GoldenEye addresses German speaking users so far.&nbsp; <\/p>\n<p><!--more--><\/p>\n<h3>Human resources department as target<\/h3>\n<p>The spam e-mails are addressing people in German human resources department \u2013 suggesting it will be a legit application.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"E-Mail mit Ransomware\" alt=\"E-Mail mit Ransomware\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/986406\/Ransomware\/Petya\/spam-email.png\" width=\"602\" height=\"446\"><br \/>(Source: <a href=\"https:\/\/web.archive.org\/web\/20220119114433\/https:\/\/www.bleepingcomputer.com\/news\/security\/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a>) <\/p>\n<p>The e-mail body contains the name of a person within the human resources department and also addresses job offers from this company as well as non public e-mail-addresses and phone numbers of this employee. The mail contains a PDF document with further details to make it more serious looking. Attached is also an Excel .xls file, suggesting that it contains a resume or curriculum vitae. <\/p>\n<p><a href=\"https:\/\/i.imgur.com\/lz3SjQJ.jpg\"><img decoding=\"async\" title=\"Excel-Dokument\" alt=\"Excel-Dokument\" src=\"https:\/\/i.imgur.com\/lz3SjQJ.jpg\"><\/a><br \/>(Source: malwr.com) <\/p>\n<p>If the receiver of this spam mail opens the Excel file, he will be greeted with a German message, suggesting to enable the Excel feature to edit the document. If the user enables this feature, a macro will be executed. This macro load some encryption Trojans and begin to encrypt user data. Afterward, the ransomware displays a note:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/986406\/Ransomware\/Petya\/ransom-note.png\" width=\"636\" height=\"321\"><br \/>(Source: <a href=\"https:\/\/web.archive.org\/web\/20220119114433\/https:\/\/www.bleepingcomputer.com\/news\/security\/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a>)<\/p>\n<p>On the given website the cyber criminals requests 1,33 bitcoins to unencrypt the user data. The Trojan also tries to install a new master boot record (MBR) to encrypt more files. Further details may be found within my German article or at <a href=\"https:\/\/web.archive.org\/web\/20220119114433\/https:\/\/www.bleepingcomputer.com\/news\/security\/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Petya-Mischa ransomware seems to return as \"GoldenEye\", hitting German companies. Currently the e-mail spam campaign spreading GoldenEye addresses German speaking users so far.&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[550,549,243,194],"class_list":["post-1766","post","type-post","status-publish","format-standard","hentry","category-windows","tag-goldeneye","tag-petya","tag-ransomware","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/1766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=1766"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/1766\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=1766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=1766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=1766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}