Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay


A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount.

This exploits leverage the recently discovered WinRAR ACE code injection vulnerability, since then attackers continuously exploiting the vulnerability to intrude the targeted system in various ways.

Source: gbhackers

WinRAR is the worlds most popular Compression tool that used over 500 million users around the world.

The 19-year-old vulnerability was disclosed by checkpoint security researchers last week, the vulnerability resides in the WinRAR UNACEV2.DLL library.

Since the vulnerability has been already patched, attacker aiming to exploit and compromise the unpatched vulnerable systems.

JNEC.a Ransomware payload stored in the compressed RAR file archive, once the file will be decompressed by the victim, it opens up a corrupted and incomplete female picture.

Meanwhile, in the background JNEC.a Ransomware drops into the victim’s system and starts its process to encrypt the files and lock the system.

Malware Authors choosing very unusual decryption key delivery method by providing a Gmail ID, which should be used by victims to request the decryption key.

Researchers from 360 Threat Intelligence Center initially uncovered this JNEC.a Ransomware sample with the file name (vk_4221345.rar) and confirm that the ransomware spread by #WinRAR exploit (#CVE-2018-20250).

360 Threat Intelligence Center@360TIC

Warning!!!Possibly the first (vk_4221345.rar) spread by exploit (-2018-20250). The attacker lures victims to decompress the archive through embedding a corrupt and incomplete female picture. It renames files with .Jnec extension.https://www.virustotal.com/#/file/551541d5a9e2418b382e331382ce1e34ddbd92f11772a5d39a4aeb36f89b315e/detection 

132 people are talking about this

Once the system exploited successfully, the encryption routine starts to lock the file and displays the ransom notes, that contains steps to recover the decryption key.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: