GoldenEye ransomware disguised as job application

Opening the Excel attachment will encrypt the files on your computer

Check Point has uncovered a ransomware attack that is targeting German HR managers by posing as a legitimate job application.

The email is sent with a harmless PDF covering letter and an Excel spreadsheet that contains the ransomware. When the victim opens the Excel spreadsheet, they are invited to enable content so the macros can run. Upon giving the go-ahead, the malicious macro will launch a program that encrypts all the files on the user's computer, presents the message "YOUR_FILES_ARE_ENCRYPTED.TXT".

Advertisement - Article continues below

While the files are being encrypted, the user is faced with a fake "chkdsk" screen, urging them not to turn off their PC. When all the files are encrypted, they will see a skull and crossbones and be told their files have been encrypted using GoldenEye, with instructions of how to pay the ransom and unlock their files. The rates to unlock files start at 1.3 Bitcoins (800) per infection.

"Despite trying to brand itself as a new malware, GoldenEye, the latest Petya variant, is very similar to older versions and differs mostly in its "golden" motif," Check Point explained. "The most prominent change, however, is how the campaign spreads the ransomware.

"The current campaign used to distribute GoldenEye has a job application theme. It is therefore aimed at companies' Human Resources departments, due to the fact they usually cannot avoid opening emails and attachments from strangers, a common malware infection method."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The researchers said the campaign has only been running for a few days and it seems as though the infected attachment has been given a number of names, making it even more confusing for recipients. However, they follow the same format, with the supposed candidate's name as the first part of the file name and "Bewerbung", meaning "application" in German, as the second part.

Main image credit: Check Point

Featured Resources

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Remote working 2020: Advantages and challenges

Discover how to overcome remote working challenges

Download now

Keep your data available with snapshot technology

Synology’s solution to your data protection problem

Download now

After the lockdown - reinventing the way your business works

Your guide to ensuring business continuity, no matter the crisis

Download now
Advertisement

Recommended

How can you protect your business from crypto-ransomware?
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Malware attacks using machine identities doubled in 2019
cyber security

Malware attacks using machine identities doubled in 2019

4 Aug 2020
Over two dozen Android apps found stealing user data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Best antivirus for Windows 10
antivirus

Best antivirus for Windows 10

30 Jun 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
How do I fix the Windows 10 Start Menu if it's frozen?
operating systems

How do I fix the Windows 10 Start Menu if it's frozen?

3 Aug 2020