?Ransomwared Ransomware Strain Demands Explicit Pictures As Payment BEST
On 24 October 2017, some users in Russia and Ukraine reported a new ransomware attack, named "Bad Rabbit", which follows a similar pattern to WannaCry and Petya by encrypting the user's file tables and then demands a Bitcoin payment to decrypt them. ESET believed the ransomware to have been distributed by a bogus update to Adobe Flash software.[108] Among agencies that were affected by the ransomware were: Interfax, Odesa International Airport, Kyiv Metro, and the Ministry of Infrastructure of Ukraine.[109] As it used corporate network structures to spread, the ransomware was also discovered in other countries, including Turkey, Germany, Poland, Japan, South Korea, and the United States.[110] Experts believed the ransomware attack was tied to the Petya attack in Ukraine (especially because Bad Rabbit's code has many overlapping and analogical elements to the code of Petya/NotPetya,[111] appending to CrowdStrike Bad Rabbit and NotPetya's DLL (dynamic link library) share 67 percent of the same code[112]) though the only identity to the culprits are the names of characters from the Game of Thrones series embedded within the code.[110]
‘Ransomwared’ Ransomware Strain Demands Explicit Pictures as Payment