• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
open source ransomware toolkit cryptonite turns into accidental wiper malware

Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware

You are here: Home / General Cyber Security News / Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware
December 6, 2022

A edition of an open source ransomware toolkit identified as Cryptonite has been noticed in the wild with wiper abilities owing to its “weak architecture and programming.”

Cryptonite, as opposed to other ransomware strains, is not accessible for sale on the cybercriminal underground, and was in its place offered for no cost by an actor named CYBERDEVILZ until eventually recently as a result of a GitHub repository. The resource code and its forks have considering the fact that been taken down.

Written in Python, the malware employs the Fernet module of the cryptography offer to encrypt files with a “.cryptn8” extension.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

But a new sample analyzed by Fortinet FortiGuard Labs has been observed to lock documents with no solution to decrypt them again, essentially performing as a destructive information wiper.

But this transform isn’t really a deliberate endeavor on component of the danger actor, but fairly stems from a lack of high-quality assurance that triggers the system to crash when trying to show the ransom take note just after completing the encryption procedure.

Open Source Ransomware

“The challenge with this flaw is that thanks to the style simplicity of the ransomware if the program crashes — or is even shut — there is no way to get better the encrypted information,” Fortinet researcher Gergely Revay stated in a Monday write-up.

The exception thrown through the execution of the ransomware system also indicates that the “critical” made use of to encrypt the information is under no circumstances transmitted to the operators, therefore locking people out of their details.

The conclusions come against the backdrop of an evolving ransomware landscape wherever wipers under the guise of file-encrypting malware are becoming significantly deployed to overwrite knowledge without the need of allowing for decryption.

Discovered this post exciting? Stick to us on Twitter  and LinkedIn to study far more distinctive written content we publish.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Rackspace Restores Systems After Security Incident
Next Post: Prolific Chinese Hackers Stole US COVID funds Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.