Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Ransomware Just Wants You To Play PUBG
Quote:The only files encrypted are those on your desktop. As malware goes, this one is pretty lightweight. While the program claims to monitor your PUBG playing time, there’s no need to actually play for an hour — starting the executable for just three seconds is apparently enough to begin the decryption process. You don’t even actually need to play PlayerUnknown’s Battlegrounds. Rename any executable TSLGame.exe, run that, and the unlock process begins again. And the app even includes an unlock code that’ll let you reverse the encryption process without playing the game.

On the surface, this reads more like a silly prank than a serious attempt to extort people. After all, it doesn’t even work particularly well. But this kind of activity could have a genuine dark side. Instead of encrypting files for cash, hackers could request people perform seemingly small tasks that installed malware to their system to exfiltrate additional data.

If you’ve surfed the net for any length of time, you’ve probably encountered pop-up ads that insist you need to install a certain plugin or application to view content. Chain that attack vector to ransomware, and people might willingly compromise their own machines. Infected machines could then be leveraged in botnet attacks or have their data exfiltrated.

And that, of course, is just the tip of the iceberg. We’ve already seen how companies are willing to game systems to improve product sales, to the point that certain people have gotten products from Amazon that they never ordered, just to generate verified sales for reviews on the site. To the best of our knowledge, ransomware hasn’t been used for this kind of scam yet, but it could be. Want to drive page views or YouTube video plays? Fold it into a ransomware attack. When you ask for $5,000, people balk. If you ask them to watch a video, they’d be more likely to click the link, hit Play, and go pour a cup of coffee.

Forum Jump:

Users browsing this thread: 1 Guest(s)