• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

GIBON Ransomware sold for $500 in Russian dark web criminal forum

{{postValue.id}}

ran

The GIBON Ransomware variant was on sale with a $500 price tag in Russian dark web criminal forum advertisement. The advertisement said that GIBON has the ability to use recursive encryption, leave README.txt files in messages to users, encryption keys sent to admin and create both encryption and decryption keys. Once the system is infected, the malware adds the .encrypt extension to the encrypted file’ s name.

The malware was first found by ProofPoint researcher Matthew Mesa who found out it was being distributed via malspam with malicious document attached that contained macros.

The malware’ s command and control server only supplies the ransom note to its victims. This in turn allows the developer to update it without having to compile a new executable. Victims who are registered to the C2 server and ransomware will generate an encryption key locally as base64 encoded string.

The malware encrypts the devices targeting all the files irrespective of their file extensions.

It’ s still unclear on how much money the ransomware is demanding but researchers have been instructed to contact the following emails bomboms123@mail.ru and yourfood20@mail.ru for payment instructions.

The encryption is done with a 2048-bit key and the criminals challenge that it is impossible to decrypt files by standard methods.

Tags:
john
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

What is GIBON Ransomware

A

The GIBON Ransomware variant was on sale with a $500 price tag in Russian dark web criminal forum advertisement. The advertisement said that GIBON has the ability to use recursive encryption, leave README.txt files in messages to users, encryption keys sent to admin and create both encryption and decryption keys. Once the system is infected, the malware adds the .encrypt extension to the encrypted file&rsquo s name.

Q

What is malware?

A

The malware was first found by ProofPoint researcher Matthew Mesa who found out it was being distributed via malspam with malicious document attached that contained macros.

Q

What is GIBON ransomware?

A

GIBON is a ransomware-type virus discovered by a security researcher, Matthew Mesa. This malware is distributed via a malicious MS Office document attached to spam emails. The document contains a number of macro commands designed to download and install malware. Once infiltrated, GIBON encrypts stored data and appends the ".encrypt" extension to each filename. For instance, "sample.jpg" is renamed to "sample.jpg.encrypt". Following successful encryption, GIBON creates two files ("desktop.ini.encrypt" and "READ_ME_NOW.txt"), placing them in each existing folder.

Q

How did ransomware infect my computer?

A

As mentioned above, GIBON is promoted via spam emails, however, these viruses are also often proliferated via fake software updaters, unofficial software distribution sources, and trojans. Fake software updaters infect the system by exploiting outdated software bugs/flaws. Third party software download sources (e.g., freeware download websites, free file hosting websites, torrents, etc.) often present malicious executables as legitimate software, thereby tricking users into downloading and installing malware. Trojans work very simply - they merely open "gates" for malware to infiltrate the system. The main reasons for computer infections are poor knowledge and careless behavior.

Q

How to protect yourself from ransomware infections?

A

To prevent this situation, be very cautious when browsing the Internet. Never open files received from suspicious email addresses - these emails should be deleted without reading. Furthermore, download your software from official sources only using a direct download link (third-party download/installation tools often install malicious apps). In addition, keep installed applications up-to-date and use a legitimate anti-virus/anti-spyware software, but bear in mind that criminals employ fake updaters to proliferate malware. Therefore, using a third party tool to update apps is very risky. The key to computer safety is caution.

The text presented in GIBON ransomware text file ("READ_ME_NOW.txt"):

Attention! All the files are encrypted!
To restore the files, write to the mail:bomboms123@mail.ru
If you do not receive a response from this mail within 24 hours,
then write to the subsidiary:yourfood20@mail.ru

Screenshot of GIBON admin website:

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Gibbson ?
How do i run both nginx and apache in same instance on centos

Hi...,

my server is based centos operating system and my webserver is already running on Apache.... i need to run both apache and nginx on same instance ... please help me to implement this concept...

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.