A recently identified ransomware variant dubbed OPIX encrypts user files using a random character string and adds the “.OPIX” extension to them.
The ransomware will drop a notice on victims’ screens telling them to get in touch with the attackers via the specified email address or Telegram handle within 48 hours, failing which their stolen data would be sold to competitors and made public on the dark web.
The OPIX ransomware variant is commonly disseminated using social engineering techniques including drive-by downloads and phishing emails.
This software is typically presented as or combined with legitimate/normal content.
Files that are malicious may be executables (.exe,.run, etc.), documents (Microsoft Office, Microsoft OneNote, PDF, etc.), archives (RAR, ZIP, etc.), JavaScript, and more.
Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan
According to Symantec, the malware now encrypts user files with a random character string and appends the “.OPIX” extension.
One such file that is transformed from “test.txt” to “B532D3Q9.OPIX” is one example.
Victims will get a ransom note, commonly named “#OPIX-Help.txt”, telling them to contact the attackers via the specified email or Telegram handle within 48 hours, or their stolen data would be sold to competitors and broadcast on the dark web.
In this case, decryption is typically unfeasible in the absence of attacker intervention. Despite this, cybercriminals frequently fail to deliver the claimed decryption key or software, paying the ransom does not ensure that the files will be recovered.
Never forget that giving money for criminal activity is what keeps them doing what they do.
To protect your files, it is therefore strongly advised that you maintain backups in several different places (such as remote servers, unplugged storage devices, etc.).
When receiving emails or messages, proceed with caution. Links or attachments included in questionable or irrelevant emails should not be clicked because they may be dangerous.
The following are the indicators that Symantec has detected and removed this threat.
ACM.Untrst-FlPst!g1
ACM.Untrst-RunSys!g1
SONAR.SuspBeh!gen16
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g250
SONAR.SuspLaunch!g340
SONAR.SuspLaunch!gen4
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Existing policies in VMware Carbon Black products detect and block associated harmful signs.
To maximize the benefits of VMware Carbon Black Cloud reputation service, it is recommended to stop all known, suspect, and PUP malware from running and to delay the execution of cloud scans.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
Cross-strait tensions have escalated into a new domain as China and Taiwan engage in unprecedented…
The penetration testing community has received a significant upgrade with the release of Kali Linux…
Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the…
Despite sustained international pressure, sanctions, and public exposures over the past two years, the sophisticated…
Microsoft 365 users across Asia Pacific, Europe, the Middle East, and Africa are experiencing significant…
A sophisticated new attack method called "SmartAttack" that can breach supposedly secure air-gapped computer systems…