EDA2 Open-Source Ransomware Code Used in Real-Life Attacks

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
Cyber-crooks have used the open-source code of the EDA2 ransomware to create the Magic ransomware strain, which has been spotted in real-life attacks against users in the past few days.

This is the second time this happens, after the open-sourced code of the Hidden Tear ransomware was also deployed in live attacks around two weeks ago via the RANSOM_CRYPTEAR.B ransomware family.

No happy ending for Magic ransomware victims

Creator of both projects is Turkish security researcher Utku Sen, who says that both his projects, Hidden Tear and EDA2, were published only for educational purposes.

For RANSOM_CRYPTEAR.B victims, the story had a happy ending, as Utku Sen revealed that he purposely left an encryption flaw in the ransomware's code, which other security researchers used to help out ransomware victims.

However, there is no happy ending for Magic ransomware victims, who currently have no way of recovering their files, even if they pay the ransom. More on this later.

How Magic ransomware works
EDA2 Open-Source Ransomware Code Used in Real-Life Attacks
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top