KillDisk: One of the most brutal ransomware

Поділитися
Вставка
  • Опубліковано 17 жов 2024

КОМЕНТАРІ • 277

  • @cestmamin
    @cestmamin 2 роки тому +182

    Siam Alam once got attacked by a Ransomware, now he is really scared of them and makes these videos. Keep it going fam

    • @lsudo
      @lsudo 2 роки тому +4

      wait really?

    • @commensalism1997
      @commensalism1997 2 роки тому +1

      @𓀐𓂸 oh god

    • @komfynn
      @komfynn 2 роки тому +2

      @𓀐𓂸 what the actual f-

    • @BenjaminAster
      @BenjaminAster 2 роки тому +4

      @𓀐𓂸 How are these even unicode characters?

    • @GabrielValentino111
      @GabrielValentino111 2 роки тому +1

      @𓀐𓂸 WOT, how u dat cursed characters

  • @techdiscussionsmore5055
    @techdiscussionsmore5055 2 роки тому +63

    continue more of this, i see not many people have seen this so i just wanna support you. Keep these good videos up! I've been here for a while now and i've really been enjoying your content

  • @mzpl7357
    @mzpl7357 2 роки тому +307

    It couldn't override GRUB since you didn't execute it as root. Generally, you should never execute random scripts with root privileges on Linux

    • @Farid0
      @Farid0 2 роки тому +17

      Linux is meant to be secure and i definitely agree.

    • @JayCeeCreates
      @JayCeeCreates 2 роки тому +47

      Just shows that Windows' UAC is completely useless even if you're an admin

    • @Sumire973
      @Sumire973 2 роки тому +15

      @@JayCeeCreates Windows UAC is intended to be used by a standard/normal user tho

    • @SkyyySi
      @SkyyySi 2 роки тому +33

      I mean... you shouldn't run random code in general, no matter what permissions or OS.

    • @TrizziEhgan
      @TrizziEhgan 2 роки тому +4

      sorry sudo and doas

  • @zenujinroblox
    @zenujinroblox 2 роки тому +12

    When siam posts, and i hear a banging intro, i know this video is gonna be good. keep up siam.

  • @1FireyPhoenix
    @1FireyPhoenix 2 роки тому +99

    Running random executables on any operating system is a big no-no. Weather that be Windows, Mac or Linux. Especially as root on the last two platforms. If you run any executable as root, you must always take in to account wether or not you trust that application with all of your data. That's why distributions that are beginner friendly insist on you creating an account that isn't root, like ubuntu or debian for instance. Should you run a random executable as a non-privilaged user, just about the only thing it can touch is /home/username and whatever else the user has permissions to.

    • @SiamAlamOfficial
      @SiamAlamOfficial  2 роки тому +31

      True, I don’t think a person would execute random executables with root privileges like this on their Linux/Mac system. Chances of this variant of KillDisk actually damaging victims are very low. But nonetheless, its a bit different from usual ransomware we see everyday and that interests me lol

    • @Sumire973
      @Sumire973 2 роки тому +3

      There is malware that can bypass antivirus programs as well.

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому +5

      Indeed, but i guess the authors planned on using exploits in targeted campaigns rather than using them against the common user.

    • @Tezos1644
      @Tezos1644 2 роки тому +2

      @@SiamAlamOfficial there are crypto scam boys in your comments. On a youtuber that promotes security and shows of malware 😭😭😭

    • @1FireyPhoenix
      @1FireyPhoenix 2 роки тому

      @@Sumire973 That’s true. But that’s the whole point between separation of root/user. Run any malware all you want in Linux, and as long as you don’t give it your root password, it can’t affect the system as a whole. (I mean, in theory. Some userland programs must run as root, and are spawned by sysvinit, systemd, upstart, etc… if you find an exploit for one of those programs, you can do privilege escalation attacks. Best mitigation to that is… update your installation as soon as possible. Just like the latest log4j garbage)

  • @funnyarc
    @funnyarc 2 роки тому +11

    Always make backups, do not assume a OS will always be safe from vulnerabilities as long as it's connected to the Internet. And of course, it's important if storage medium dies or gets bad sectors, corrupting data.
    When making backups to an offline disk, is probably good idea boot up a external Linux Distro from a USB stick and backup whatever files from the partition that you require through that, this will erase the potential of the previous existing several good backups from a week, month or year ago, on that offline disk, being destroyed by ransomware from the OS you are doing the backup on.
    Also, Never connect that USB stick to your system or anything that could br possible infected, since then the content of the USB storage medium can be infected too.
    As for backup to NAS, enable on the NAS, hourly or daily incremental, differential, ZFS snapshot, etc, (shouldn't take much space anyway, since that only save difference in data) this will eliminate the potential of a ransomware to overwrite all the files on all available network shares, since everyday a snapshot is made on the NAS and you can rollback to the previous good files.
    Of course it's important to know that if you have automatic snapshot deletion on too much space usage enabled, then the ransomware could delete the snapshots by keep copying files and the NAS making snapshots of those encrypted files. If you keep watch over space usage, you should notice if something weird is going on, like a sudden almost double or triple increase in space usage for no reason.
    But even with this, NAS can have a vulnerability in software, like with Synology, which had Synolocker and several other ransomware, people got when running these on internet, either through port forward router, or Synology's own reverse proxy.
    So offline backup is important...perhaps good idea to keep 2-3 HDD's, where a backup on 1 drive is done every 6-12 months (though, note keeping HDD or SSD with no power too long may cause bitrot or corruption), and other done monthly or weekly. Were if a ransomware problem is there and it got to Everything connected to the network, infecting for 1-2 months in background, before displaying ransom popup, at least there is a backup from 1 year ago.
    And lastly, don't run Random Sheit you don't actually know if it's safe and legit, especially random junk from people on Discord, Facebook, mail, etc, also don't plug in random USB devices (BadUSB), also don't make your stuff accessible from the internet...unless maybe through OpenVPN, which was configured securely, with a Very long key, and kept up to date.

  • @ammoniahuffers
    @ammoniahuffers 2 роки тому +12

    "You can lost your data or pay 222 BTC to ..."
    Ah, as a virus remove technician, I well familar with this.

  • @inqmusician2
    @inqmusician2 2 роки тому +5

    "Well, somebody did. They used ransomware to lock the doctors out of their own systems. And their demanding millions." (c) Josh Sauchak.

  • @eletricqw7192
    @eletricqw7192 2 роки тому

    hello, where can i get the sampla of this malware to download? I would like to do some tests in a controlled environment

  • @TegridyMadeGames
    @TegridyMadeGames 2 роки тому +3

    At least the fee is only 222 btc, thats like nothing right?

    • @Baer9471
      @Baer9471 2 роки тому +1

      Except for the fact that 222 bitcoins cost millions of dollars

  • @retrokid8606
    @retrokid8606 2 роки тому +6

    someone: It is impossible to break linux
    that one guy:

    • @supermilkdude1380
      @supermilkdude1380 8 місяців тому

      Its very easy to break Linux if you want to, that is.

  • @romanhredil3799
    @romanhredil3799 2 роки тому +3

    I wonder how it displays the ransom note if GRUB is not installed

  • @khalishakhairani4795
    @khalishakhairani4795 2 місяці тому

    I am really curious if this ransomware can run on mac. They both cousins, Unix XNU and Linux GNU.

  • @DivyaPrakash-bj6zk
    @DivyaPrakash-bj6zk 2 роки тому +14

    Siam Sir I would request if you keep subtitles for bit more longer...its hard to read them without pausing the video.

    • @lsudo
      @lsudo 2 роки тому

      same

    • @SiamAlamOfficial
      @SiamAlamOfficial  2 роки тому +7

      sure! I will make sure to keep them longer next time.

    • @aeio_
      @aeio_ 2 роки тому +3

      Alternatively, you could use YT itself to slow down the video: Settings / Playback speed. (Probably have to mute because the music will slow down as well.)

  • @DarkGT
    @DarkGT 2 роки тому +2

    Can you repeat the experiment with immutable settings, like AppArmor hardening?

  • @NovemberJoy
    @NovemberJoy 2 роки тому +2

    I feel like this one's less ransomware and more just... killware, but maybe someone has tried to send something to that address already. Interesting video.

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      No, it definitely counts as ransomware. I'm pretty sure the definition doesn't require the ransomers to do what they say they will in exchange for the ransom. And if they actually demand something people can reasonably pay (i.e. much less than 222 BTC), what's important to them is they get money (never mind that keeping their promise might be better for them in the long run). And no, no one ever sent anything to that address. You can type it into any blockchain explorer and see for yourself. That said, I can't tell from this video whether the address is hard-coded, or is generated from a master public key, or whatever. If there is a master key and it can be extracted, it would be possible to generate all possible addresses and check them. That's a big if, though.

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому +1

      @@fllthdcrb No, it's a wiper. It could be counted as ransomware only if it's destructive actions were intended, but they are not.

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      @@malwaretestingfan WTF are you saying? First of all, what does intent to destroy have to do with it being ransomware? If it makes your data inaccessible and demands a ransom to get it back, how is it not ransomware? Heck, apparently there is some ransomware that merely disables access to the system in a way that is easy to fix; that doesn't destroy anything, nor is it at all competent, but it still counts.
      Second, this thing encrypts files with random keys that are immediately forgotten, thus ensuring that, for all practical purposes, they cannot be recovered. You can't tell me the people who made it into ransomware simply forgot to have it save the keys (unless they were just exceptionally incompetent). By all appearances, it deliberately destroys data. And then it demands a ransom (which as it just so happens, can never actually result in the data's restoration, which is an extra layer of evil, but whatever). So even by your strange definition, it looks like it still counts.

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому +1

      ​@@fllthdcrb It intentionally destroys data, that's enough to classify it as a "wiper" (just a Trojan, or McAfee's Trojan-Wiper classification) rather than a ransomware (Trojan-Ransom). Also, i meant "intended" in the malware classification sense, where a malware is "intended" when the malware does vastly different things from what the authors coded it to do. KillDisk is not "intended" because the authors never wanted to code a ransomware to begin with, it was no more but a wiper. It did not end up as a wiper because the authors were incompetent. Keep also in mind that malware classification accepts "overlaps": NotPetya spreads on the Web and is a wiper, but it's not mainly classified as a Net-Worm.

    • @fllthdcrb
      @fllthdcrb 2 роки тому +1

      @@malwaretestingfan I see. So, by "authors", you mean whoever coded the original version that targeted the Ukraine infrastructure, as opposed to whoever modified it? Now I think I understand. Though I must say, my outsider opinion on this way of classification is that it's a bit counter-intuitive.

  • @RifmarioGamer
    @RifmarioGamer 2 роки тому +14

    It would be better if killdisk were a worm and can encrypt all devices conected to the same network, that would be BRUTAL

    • @thesun7544
      @thesun7544 2 роки тому +8

      Well don't give em ideas

    • @jurivjerdha2467
      @jurivjerdha2467 2 роки тому +1

      That should be impossible

    • @RifmarioGamer
      @RifmarioGamer 2 роки тому

      @@jurivjerdha2467 It shouldnt, it would be very cool

    • @maccheats3661
      @maccheats3661 2 роки тому +2

      @@RifmarioGamer Yea, cool until you accidentally download it lol ._.

    • @chlorobyte_projects
      @chlorobyte_projects 2 роки тому +2

      @@RifmarioGamer Too bad sysadmins don't think a random exploit that allows an entire disk to be remotely encrypted is cool, so software is designed to not allow for such an event to occur.

  • @GC-qe8vc
    @GC-qe8vc 2 роки тому +2

    So if you don't make it executable (+x) and don't run it as root, then it can't do anything. Some malware...

  • @doctorletsplay
    @doctorletsplay 2 роки тому +1

    What happens if you boot the linux after the script ? You could still boot via grub minimal

    • @pankoza
      @pankoza 2 роки тому

      it will probably show unsupported executable format or something like that

  • @joraj9312
    @joraj9312 2 роки тому +8

    wow, honestly as a linux user, this made my stomach turn upside down.

    • @Chriss4123
      @Chriss4123 2 роки тому

      What should also make your stomach turn is this guy ran it with root giving it full control over his system. Running this as a normal user would have almost no repercussions, the only files in danger would be your home directory

    • @joraj9312
      @joraj9312 2 роки тому

      @@Chriss4123 just be careful when u use sudo ;)

  • @himelmollah521
    @himelmollah521 2 роки тому +5

    Thanks brother❤️ we need to clear concept that linux can also be affected by computer viruses. BTW I have seen this for the first time.

    • @redoverflow
      @redoverflow 2 роки тому +4

      except its really hard to do so

    • @chlorobyte_projects
      @chlorobyte_projects 2 роки тому +1

      Yes, it's pretty obvious that malware can exist on Linux.
      However, this is not a virus, it's ransomware. It would be a virus if it infected the computer remotely. This is much easier to do with Windows systems that are filled with security holes and the patching of which takes literally forever.
      Random malware in general is also more powerful on Windows, as the Windows way is just inherently insecure. People basically click yes on the UAC prompt every day, and so it's easy for any malware to gain privileges. On the other hand, Linux users install software with a package manager, and root access isn't really used for much else, so it would be kinda sus to ask someone to run this thing as root.

    • @redoverflow
      @redoverflow 2 роки тому +1

      @@chlorobyte_projects ​well unexperienced users might run it as root, but i dont think they really know what linux is, so it is really unlikely that linux will have viruses, compared to windows

  • @phoenixtheceikraill
    @phoenixtheceikraill 2 роки тому +2

    First time I seen ransomware for a Linux system.
    Edit: Does it affect systems running on ARM?

    • @terragameryt8586
      @terragameryt8586 2 роки тому +1

      Nope because it's compiled for X86(_64)

    • @vascomanteigas9433
      @vascomanteigas9433 2 роки тому +1

      If the user installs qemu-user-static the x86 malware will run directly on ARM, as it installs a x86 emulator. The inverse also happens similarly. (A ARM binary on x86).

  • @SquirrelMonkeyCom
    @SquirrelMonkeyCom 2 роки тому +13

    Love the music!

  • @Milena-ix5mq
    @Milena-ix5mq 2 роки тому +1

    Side note, but what theme of ubuntu is that, also is it Ubuntu, or is it another distro, based on it?

    • @taiekvana
      @taiekvana 2 роки тому +3

      It's just plain Ubuntu with a different background.

    • @Milena-ix5mq
      @Milena-ix5mq 2 роки тому +1

      @@taiekvana Thank you! I have been distro-hopping for a while, but have never tried Ubuntu, so I saw that theme and liked it, so I just asked what it is. Thank you for answering me :)

  • @gdjuliostyles9076
    @gdjuliostyles9076 2 роки тому

    If I end the project "DOSmetry Dash Trojan", can I give you the malware for only a demostration?

  • @angelosimone6490
    @angelosimone6490 2 роки тому +2

    What is the sense if Ubuntu always asks to you the autentication before running executable txts?

    • @angelosimone6490
      @angelosimone6490 2 роки тому +1

      @Sascha Because of this, the worm can't start alone

    • @angelosimone6490
      @angelosimone6490 2 роки тому

      @Sascha Anyway it's not sense, because it can't start alone. You are going to be very insane if you start the ransomware on your main pc

    • @iselink
      @iselink 2 роки тому +1

      ​@Sascha In linux, file extension doesn't matter in most cases.

  • @ABCXYZ-zh3gp
    @ABCXYZ-zh3gp 2 роки тому

    can i get the file or the virus file, i need it cuz i want to use it for my project demonstration

  • @businessgate4931
    @businessgate4931 2 роки тому

    thank sir. my pc has attacked by .utjg ransomware . need your advice to recover my file.

  • @bitelaserkhalif
    @bitelaserkhalif 2 роки тому +1

    Alternative for dban?

  • @bilalefeklc3691
    @bilalefeklc3691 2 роки тому

    Nice video bro! Happy to see you back here!

  • @thepwrtank18
    @thepwrtank18 2 роки тому +4

    "222 btc"
    no one is gonna be able to pay that

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому +1

      I guess that's the point, it's a wiper.

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      @@malwaretestingfan Well, maybe, but why bother including a ransom note? With a valid Bitcoin address?

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому

      @@fllthdcrb I think it's to disguise as a legitimate ransomware.

  • @hackerkinggames5810
    @hackerkinggames5810 2 роки тому +1

    can you recorde video for the dangerus malware and virus in system phone and thk

  • @johannlopez4524
    @johannlopez4524 2 роки тому

    is the Killdisk by Lsoft active @

  • @itahadurrahman4512
    @itahadurrahman4512 2 роки тому

    Hey bro how do I recover .mljx ransomware files?

  • @DominikHatHunger
    @DominikHatHunger 2 роки тому +5

    how old is this ransomware? Asking for 222 Btc is like Dr. Evil asking for 100 billion dollars in 1969

  • @NOTNULLBG
    @NOTNULLBG 2 роки тому

    Pls make tutorial on how to run vm mine keeps crashing cuz of Failed to open session

  • @meriemmarie1081
    @meriemmarie1081 2 роки тому +1

    What is the time of fmv 99

  • @sulaimanansari1633
    @sulaimanansari1633 2 роки тому +1

    Any solution FOR . MME ransomwre

  • @HoboVibingToMusic
    @HoboVibingToMusic 2 роки тому +15

    To be honest no ordinary linux user would get this ransom on their PC. Since it was targetted towards Servers from what I understood. :P

    • @Hyrionn
      @Hyrionn 2 роки тому +8

      I use Arch BTW

    • @surv5k
      @surv5k 2 роки тому +2

      I use Mint BTW 😎

    • @Karatic
      @Karatic 2 роки тому +1

      I use windows 10 BTW

    • @oqocraft2661
      @oqocraft2661 2 роки тому +4

      I use Gentoo BTW

    • @AitorWindows11
      @AitorWindows11 2 роки тому +1

      I use Windows 11 btw

  • @zooe2494
    @zooe2494 2 роки тому

    what is the name of this linux?

  • @naga_serpentis
    @naga_serpentis 2 роки тому

    Shiz, gotta look out for this now. Thanks for the video, it’s been an education.

    • @naga_serpentis
      @naga_serpentis 2 роки тому

      @Watcher I had no idea about this till now XDXDXS

  • @zikoadloune5042
    @zikoadloune5042 2 роки тому

    Do siam alam use virtual machines ?

  • @justinnishanthan214
    @justinnishanthan214 2 роки тому

    Hi brother. My laptop attacked by rigj Ransomware Virus... And Encrypted.. Can you help me please. I hv more important fils...

  • @KristianAlpeza
    @KristianAlpeza 2 роки тому +3

    ah yes because who doesent have 222 bitcoins just lying around in a wallet

  • @debactuel
    @debactuel 2 роки тому +1

    in wich language is this written ?

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      You mean which programming language was the malware written in? It would be hard to be sure when only a binary is available. However, given that it appears to be linked against libc, C is likely.

  • @dd31234
    @dd31234 2 роки тому

    the intro music was so awesome, please link me the music

  • @febribayunurcahyo9308
    @febribayunurcahyo9308 2 роки тому

    "This is amazing! Pretty much nothing seems to work"

  • @vargasf.4854
    @vargasf.4854 2 роки тому +6

    Lubuntu está a salvo, es incapaz de ejecutar archivos que no sean .deb debido a que carece de muchas librerías.
    3:56 POV: estabas probando linux desde una USB y esta se desconecta.

  • @funnyarc
    @funnyarc 2 роки тому +1

    Oh man, this malware using that name is not good for LSoft Technologies, a company making all sorts of reputable tools , including a disk or partition eraser named KillDisk, which you can compare the usage to Darik's Boot and Nuke (DBaN), except KillDisk has a really nice interface and, has a program for Windows, bootable disk which uses Linux Kernel (old one DOS), and other things.

  • @atirutwattanamongkol8806
    @atirutwattanamongkol8806 2 роки тому

    I need more of these Linux malware investigation

  • @user-em2ld
    @user-em2ld 2 роки тому

    what if i use systemd-boot or other bootloader

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому

      There's a strong chance KillDisk will fail to display it's message payload, if anything.

  • @cinnamonc4t
    @cinnamonc4t 2 роки тому +4

    i love these ransomware videos!

  • @Chriss4123
    @Chriss4123 2 роки тому

    You can’t say malware is bad is bad if you run it with root. This would never be able to survive a device reboot given it was run by a normal user, and if it was it would not be hard to kill it

  • @Im_storm_yt
    @Im_storm_yt 2 роки тому

    What is your OS?🤔

  • @toustikcz640
    @toustikcz640 2 роки тому

    thats ubuntu linux?

  • @pankoza
    @pankoza 2 роки тому +8

    ok so now i know linux can get virus

    • @mohmmedpro-4353
      @mohmmedpro-4353 2 роки тому +1

      yeah, linux cant get virus that the virus working on windows. u must try and do commands. to open it.

    • @mrpro2264
      @mrpro2264 2 роки тому +3

      any os can get virus

    • @jefish4981
      @jefish4981 2 роки тому +2

      @@mrpro2264 temple os when?

    • @gant6962
      @gant6962 2 роки тому +4

      Any OS. Even MAC and IOS. Even a toaster if you try hard enough.

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому +1

      Any OS can, Linux is just harder to target (only in Desktop systems, Android phones and IoT devices are the most easy to infect).

  • @jurivjerdha2467
    @jurivjerdha2467 2 роки тому +1

    Thanks god i keep all my data handwritten in a safe under my garden

  • @Invalid.string
    @Invalid.string 2 роки тому +2

    It removes the encryption keys? Thats a big Oof

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      Well, "remove" implies they were permanent in any real way to begin with. They're probably just kept in RAM as long as necessary to encrypt each file.

  • @CsyeCokTheSolly
    @CsyeCokTheSolly 2 роки тому

    > kept a Dan Terminus song in the VM
    chad.

  • @HikaruAkitsuki
    @HikaruAkitsuki 2 роки тому +1

    Windows User: Oh fuck! there is another terrible virus ahead of us!
    Linux User: Virus? I don't even know what was that.

  • @unknowncomputer238
    @unknowncomputer238 2 роки тому +1

    Vesad ransomware encrypted my files

  • @rayirth.upside-down
    @rayirth.upside-down 2 роки тому +3

    They don't want money, who has 222 BTC?

  • @dimaryk11
    @dimaryk11 2 роки тому

    You can click middle mouse button to close tabs

  • @db4695
    @db4695 2 роки тому

    Love the music.

  • @Chase2010PT2Player
    @Chase2010PT2Player Рік тому

    There is no such thing as a OS that is safe from vulnerabilities. Make sure to backup your devices EVERY DAY! MAKE IT A ROUTINE!

  • @costagirus
    @costagirus 2 роки тому

    Linux ransomware, I didn't know it was possible.

    • @GC-qe8vc
      @GC-qe8vc 2 роки тому

      As you saw, it requires... user co-operation. You have to run it as root, otherwise it can't work. If we call that "malware" I suppose that an email saying "please run sudo rm -rf / and pay me to tell you what happened" is also malware...

  • @danoofct-1979
    @danoofct-1979 2 роки тому +1

    5:36 crypto mail lol

  • @yanu4295
    @yanu4295 2 роки тому +1

    Nice, now try it out vs. Antivirus

  • @aiosquadron
    @aiosquadron 2 роки тому

    One does not simply grant sudo perms to random scripts.

  • @ItsLifeLunar
    @ItsLifeLunar Рік тому

    bro they asking for €5,997,313.21 rn 💀

  • @ItzzLeoz
    @ItzzLeoz 2 роки тому +4

    Finally a Linux malware!!

    • @apolsorgd
      @apolsorgd 2 роки тому +2

      Let's gooooo, hope I get infected sooon

    • @ItzzLeoz
      @ItzzLeoz 2 роки тому +2

      @@apolsorgdme too

    • @ItzzLeoz
      @ItzzLeoz 2 роки тому

      @Watcher yeah I know but with the comment I intended finally a Linux malware on this channel or on UA-cam

  • @srhotty
    @srhotty 2 роки тому +1

    Say
    GOODBYE

  • @Lampe2020
    @Lampe2020 2 роки тому +4

    Most ransomware is not compatible with linux, but this one obviously is.

  • @Friend_2162
    @Friend_2162 2 роки тому

    222 BTC. That virus must be built when it was worth crap because what company can afford 222 BTC?!

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      The ransomware adaptation seems to have emerged in January 2017, when BTC traded around US$1000, which means 222 BTC would be about US$222,000. That's still a hefty amount for smaller companies, isn't it? And BTC grew considerably in value over that year, so anyone who fell prey to this thing later in the year would be facing even larger demands in USD terms. Especially in December when it skyrocketed to a peak of almost $20,000.
      That said, if you look up the address from the ransom note this video shows, you'll see it's untouched. So either this thing completely failed in its primary purpose, or there were many other addresses, in an HD wallet or similar.

  • @pathikritdas6697
    @pathikritdas6697 2 роки тому

    i was literally even watching this on ubuntu

  • @kristiyanivanov7414
    @kristiyanivanov7414 2 роки тому

    Consider talking in the videos, I find it easier listening than reading the subtitles. Don't worry about your voice or accent, no one will say anything or if they do say something bad, they'd be suckers, lol.

  • @error808wreckedmix
    @error808wreckedmix 2 роки тому

    Let's get it

  • @NylaTheWolf
    @NylaTheWolf 2 роки тому

    Siam Alam: _runs ransomware_ huh, Ubuntu is acting weird now.
    yeah I wonder why???? 🥴

  • @Samantas5855
    @Samantas5855 2 роки тому

    How stupid must someone be to run an executable from the internet as root? This really isn't a realistic scenario. Its like someone telling you to do sudo rm -rf / and you do it.

    • @malwaretestingfan
      @malwaretestingfan 2 роки тому

      The malware is not for the average user. It's for targeted attacks from the part of Telebots.

    • @Samantas5855
      @Samantas5855 2 роки тому

      @@malwaretestingfan Thanks for the explanation, whats a Telebot tho?

  • @M364A
    @M364A 2 роки тому +1

    i wanna be a hacker, for pranks

    • @M364A
      @M364A 2 роки тому

      @Watcher i chamnged my mind i want to make games

    • @M364A
      @M364A 2 роки тому

      @Watcher thank you very much

  • @ankitmitrayt
    @ankitmitrayt 2 роки тому +1

    Good bgm. I like it ☺️

  • @gdjuliostyles9076
    @gdjuliostyles9076 2 роки тому

    Good video

  • @fagana01
    @fagana01 2 роки тому +1

    Is this Linux?

    • @fagana01
      @fagana01 2 роки тому +1

      @Miftik CZ also does he work with VMware?

    • @youtube.user.1234
      @youtube.user.1234 2 роки тому

      Yes it’s Ubuntu Linux

  • @zytrack4845
    @zytrack4845 2 роки тому

    PARDUS?
    NO!

  • @jhny0
    @jhny0 2 роки тому +1

    most brutal ransomware:
    sudo rm -rf /

    • @beacrox_8888
      @beacrox_8888 2 роки тому

      sudo su
      then
      mv / /dev/null

    • @jhny0
      @jhny0 2 роки тому

      @Watcher cool i use doas

  • @nekohacker591
    @nekohacker591 2 роки тому

    can you run the windows version next i want to see what happens to the windows boot

  • @DoctorFate71
    @DoctorFate71 2 роки тому +1

    Amazing UA-camr

  • @SleepyHart
    @SleepyHart 2 роки тому +2

    Linux newbie: Hey how should I protect my linux install against malware?
    Reddit techbros: LOL N00b linux doesnt get viruses or malware, dumbass
    Malware on linux:

    • @nakellold
      @nakellold 2 роки тому

      well, sudo rm -rf / will get you the same

  • @hcc3904
    @hcc3904 2 роки тому

    ugh, at 2018 btc was prolly 1400 usd. i wish i'd buy

  • @velja1312
    @velja1312 2 роки тому +1

    thought it legit kills all hard drives lol. nice video tho

    • @funnyarc
      @funnyarc 2 роки тому

      Well, the name is also being used by a program from LSoft Technologies, have been using it for a long time to quickly erase content of disks (overwrite zero's), for refurbishment of HDD, for more important data, i used DBaN, and then shredded the HDD's.
      Was surprised to see a ransomware people name KillDisk, thought what the hell happened, did LSoft go rogue?

  • @tonycstech
    @tonycstech 2 роки тому

    Linux: We are most secure OS
    Me: Watching this on Windows

  • @liquiddoomteam
    @liquiddoomteam 2 роки тому

    Oh, so you had to make it executable first and then add password several times and also rename the file to make it work... Linux seems to be quite safe then :)

  • @rudyranger249
    @rudyranger249 2 роки тому

    pog

  • @foundercayle.7327
    @foundercayle.7327 2 роки тому

    Nice video!

  • @addllerandrew3248
    @addllerandrew3248 2 роки тому

    Uma vez eu fiz isso programando em C, é só c esquecer de usar ponteiros direito.

  • @tripmooo
    @tripmooo 2 роки тому

    woah

  • @mrpro2264
    @mrpro2264 2 роки тому

    awsm video ......

  • @heberarnold1014
    @heberarnold1014 2 роки тому

    Yo logré matar el disco con la terminal de superusuario

  • @meliante-
    @meliante- 2 роки тому

    Are all your videos sponsored by Intezer?
    Meh

  • @ryankrage77
    @ryankrage77 2 роки тому

    222 Bitcoin is $10,361,184 today.

    • @rlixofficial
      @rlixofficial 2 роки тому

      yeah its insane it was $14,399,608.20 at its peak

    • @fllthdcrb
      @fllthdcrb 2 роки тому

      This was from January 2017, when that would have been a _slightly_ less insane amount of ~$200,000. Still too much, though.