Karmen ransomware will punish the user for trying to protect himself
Dragging the rope in cyberwarly continues. As soon as security experts invent a method of protection against cyber attacks, the threat authors instantly give their own ideas of avoiding new security. This is also the case with the Karmen virus, which by combating the protective technology of sandboxing severely punishes users trying to shield their computers using it - Anzena company specializing in data security and backups informs.
A few days ago, the IT security company Recorded Future announced a new type of threat detected in the Dark Web. The ransomware called Karmen is distributed in the RaaS model (ransomware-as-a-service) as a variant of the Hidden Tear virus, which encrypts the open-source project.
Like many modern threats, the virus encrypts victims' data with a strong AES-256 protocol, but its real distinguishing feature is the extremely malicious treatment of the victims. If infecting the computer, Karmen detects the sandbox environment on it (a specialized module for safe "testing" viruses) or analytical software that can warn the user about the attack. After encrypting his data, the virus automatically removes its own decryption tool. Consequently, when the victim pays to the blackmailers, her files will no longer be recoverable after direct contact with criminals. He can try to recover the data with the tools developed for the Hidden-Tear ransomware on the basis of which Karmen was created.
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.