BleepingComputer reports that the novel Onyx ransomware operation, which has already listed six victims on its data leak site, has been focused on destroying, rather than encrypting, large files, to avert potential file decryption in the event victims pay demanded ransoms.
While Onyx has been exfiltrating data from targeted networks and engaging in double-extortion attacks like other ransomware gangs, the group's ransomware has been observed by MalwareHunterTeam to overlay random junk data on files larger than 200MB, instead of applying encryption.
MalwareHunterTeam examined the source code of the Onyx ransomware and noted that the intentional encryption routine that allows the overwriting of random data has made the decryption of larger files impossible. Paying the ransom would only enable organizations impacted by Onyx ransomware to recover smaller files. The findings should prompt Onyx ransomware victims not to pay the ransom demanded by the group, according to MalwareHunterTeam.
Ransomware
Novel Onyx ransomware operation detailed
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds