Common Information
Type | Value |
---|---|
Value |
0Mega |
Category | Tool |
Type | Ransomware |
Misp Type | Cluster |
Description | 0mega, a new ransomware operation, has been observed targeting organizations around the world. The ransomware operators are launching double-extortion attacks and demanding millions of dollars as ransom. 0mega ransomware operation launched in May and has already claimed multiple victims. 0mega maintains a dedicated data leak site that the attackers use to post stolen data if the demanded ransom is not paid. The leak site currently hosts 152 GB of data stolen from an electronics repair firm in an attack that happened in May. However, an additional victim has since been removed, implying that they might have paid the ransom to the 0mega group. How does it work? Hackers add the .0mega extension to the encrypted file’s names and create ransom notes (DECRYPT-FILES[.]txt). The ransom note has a link to a Tor payment negotiation site with a support chat to reach out to the ransomware group. To log in to this site, the victims are asked to upload their ransom notes with a unique Base64-encoded blob identity. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-28 | 1 | Threat Context Monthly: Executive intelligence briefing for October 2024 | ||
Details | Website | 2024-02-07 | 1 | Cloudy with a chance of threats: Advice for mitigating the top cyber threats of 2024 | ||
Details | Website | 2023-08-02 | 10 | State of Ransomware: 2023 Midyear Review | ||
Details | Website | 2023-06-12 | 91 | 安全事件周报 2023-06-12 第24周 | ||
Details | Website | 2023-06-09 | 1 | SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint | ||
Details | Website | 2023-05-24 | 1 | Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz |