This ransomware looks to make the world a better place

security
(Image credit: Shutterstock / binarydesign)

A yet unknown threat actor wants to be the Robin Hood of the cyber-era, albeit with a twist. Instead of stealing from the rich and giving to the poor, this group forces the poor to give directly to the rich - by holding their precious data hostage until they do.

Cybersecurity researchers from CloudSEK recently discovered a ransomware strain named “GoodWill” that still infects companies, but instead of asking for payment, it’s asking for acts of goodwill against those less fortunate, all of which need to be documented and presented both publicly, and to the threat actor itself.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Helping the poor

Once a company gets infected with GoodWill, it needs to do three things:

  • Provide homeless people found on the side of the road with new clothes and warm blankets. The victim must also document the act with photos and videos, add them to the photo frame provided by the attackers, and then share on their social media (Facebook/Instagram/WhatsApp). Screenshots of those posts, together with the links, need to be sent back to the attackers, in order to receive the second assignment:
  • Buy food for poor children. In the evening, five poor kids need to be taken down to their favorite fast food restaurant and allowed to order whatever they can. The steps for this task are the same - document, post online, share with the attackers. Finally, step number three:
  • Go to the nearest hospital and pay for someone’s treatment.

After all these things, the victims need to write a “beautiful article” about their deeds, and discuss how suffering an attack at the hands of GoodWill turned them into kind human beings. Once the threat actor verifies all was done as requested, the victims will receive the decryption key. 

The researchers seemingly tracked the attackers to India, and although it cannot be absolutely certain, suspects this is the same malware group that operates the HiddenTear ransomware.

Via: Neowin

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
Representational image of a cybercriminal
Should ransomware payments be illegal?
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
AWS S3 feature abused by ransomware hackers to encrypt storage buckets
Hands typing on a keyboard surrounded by security icons
35 years on: The history and evolution of ransomware
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
More reports claim 2024 was the worst year for ransomware attacks yet
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over