About the ransomware
Nemty is a newly discovered ransomware that was first spotted in August 2019 by security researcher Vitali Kremez.
Malvertising campaign
In September 2019, a security researcher who goes under the name ‘Mol69’ spotted a new malvertising campaign that distributed the Nemty ransomware via the RIG exploit kit (EK). The researcher noted that the attackers behind Nemty targeted outdated vulnerable systems with the RIG exploit kit to distribute the ransomware.
The Nemty ransomware usually appends the ‘.nemty’ extension to the encrypted files, however, this new variant observed by Mol69 adds the ‘._NEMTY_Lct5F3C_’ extension to the encrypted files.
Nemty ransomware v1.4
Security researcher Vitali Kremez uncovered the new variant of the Nemty ransomware version 1.4 that is distributed via fake PayPal site. This fake site promises to return 3-5% from purchases made through the payment system. However, it urges users to download the malware disguised as 'cashback.exe'.
Nemty gets code update
Security researcher Vitali Kremez observed that certain updates have been made to the Nemty ransomware’s code.
Now, the complete list of blacklisted countries includes Russia, Belarus, Kazakhstan, Tajikistan, Ukraine, Azerbaijan, Armenia, Kyrgyzstan, and Moldova. The ransomware performs an ‘is RU’ check for all the blacklisted countries.
Decryptor released
Researchers from Tesorion have published a decryptor for the Nemty ransomware that allows victims to recover their encrypted files for free. The decryptor currently works only for Nemty versions 1.4 and 1.6, and for certain file types such as AVI, GIF, and MP4 among others. The generation of the decryption key is done on the researchers’ servers to prevent hackers from analyzing the decryptor.
Nemty v1.6
Researchers spotted a new Nemty ransomware variant v1.6 that is distributed via the RIG exploit kit.
Publisher