Originally posted by mouseling
View Post
From Dancho Danchev <dancho.danchev@gmail.com>
The following is an OSINT analysis aiming to assist in tracking down
the malware authors behind GPcode who seem be to be building custom
decryptors, next to issuing a universal one which can be used to
decrypt anything ever encrypted by them.
Who's behind the GPcode ransomware? It's Russian teens with pimples,
using E-gold and Liberty Reserve accounts, running three different
GPcode campaigns, two of which request either $100 or $200 for the
decryptor, and communicating from Chinese IPs. Here are all the
details regarding the emails they use, the email responses they sent
back, the currency accounts, as well their most recent IPs used in the
communication.
http://ddanchev.blogspot.com/2008/06...ansomware.html
http://blogs.zdnet.com/security/?p=1259
the malware authors behind GPcode who seem be to be building custom
decryptors, next to issuing a universal one which can be used to
decrypt anything ever encrypted by them.
Who's behind the GPcode ransomware? It's Russian teens with pimples,
using E-gold and Liberty Reserve accounts, running three different
GPcode campaigns, two of which request either $100 or $200 for the
decryptor, and communicating from Chinese IPs. Here are all the
details regarding the emails they use, the email responses they sent
back, the currency accounts, as well their most recent IPs used in the
communication.
http://ddanchev.blogspot.com/2008/06...ansomware.html
http://blogs.zdnet.com/security/?p=1259
Leave a comment: