A recently identified ransomware variant dubbed OPIX encrypts user files using a random character string and adds the “.OPIX” extension to them.
The ransomware will drop a notice on victims’ screens telling them to get in touch with the attackers via the specified email address or Telegram handle within 48 hours, failing which their stolen data would be sold to competitors and made public on the dark web.
The OPIX ransomware variant is commonly disseminated using social engineering techniques including drive-by downloads and phishing emails.
This software is typically presented as or combined with legitimate/normal content.
Files that are malicious may be executables (.exe,.run, etc.), documents (Microsoft Office, Microsoft OneNote, PDF, etc.), archives (RAR, ZIP, etc.), JavaScript, and more.
Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan
Working Of The New OPIX Ransomware
According to Symantec, the malware now encrypts user files with a random character string and appends the “.OPIX” extension.
One such file that is transformed from “test.txt” to “B532D3Q9.OPIX” is one example.
Victims will get a ransom note, commonly named “#OPIX-Help.txt”, telling them to contact the attackers via the specified email or Telegram handle within 48 hours, or their stolen data would be sold to competitors and broadcast on the dark web.
In this case, decryption is typically unfeasible in the absence of attacker intervention. Despite this, cybercriminals frequently fail to deliver the claimed decryption key or software, paying the ransom does not ensure that the files will be recovered.
Never forget that giving money for criminal activity is what keeps them doing what they do.
To protect your files, it is therefore strongly advised that you maintain backups in several different places (such as remote servers, unplugged storage devices, etc.).
When receiving emails or messages, proceed with caution. Links or attachments included in questionable or irrelevant emails should not be clicked because they may be dangerous.
Indications Of The Threat
The following are the indicators that Symantec has detected and removed this threat.
Adaptive-Based:
ACM.Untrst-FlPst!g1
ACM.Untrst-RunSys!g1
Behavior-Based
SONAR.SuspBeh!gen16
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g250
SONAR.SuspLaunch!g340
SONAR.SuspLaunch!gen4
File-Based:
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-Based:
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Carbon Black-Based:
Existing policies in VMware Carbon Black products detect and block associated harmful signs.
To maximize the benefits of VMware Carbon Black Cloud reputation service, it is recommended to stop all known, suspect, and PUP malware from running and to delay the execution of cloud scans.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free