• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Latest Cybersecurity News

Coronavirus ransomware encrypts devices to secretly allow Kpot steal credentials

William Marshal Posted On March 14, 2020
0



Coronavirus-ransomware

A new ransomware variant called ‘Coronavirus’ is distributed through a bogus website Wisecleaner.best , pretending as if it is recommending device optimization software. With the panic around the coronavirus outbreak becoming worse everyday, a hacker has specially packaged two malware and distributed this using this fake website.

First discovered by MalwareHunterteam, this coronavirus ransomware was studied and analyzed to have inherited wiper like characters as well. Attackers have created the Wisecleaner site, which looks exactly like the Windows system utility site Wisecleaner.com (another example of Phishing scam) and contains a file named WSHSetup.exe which will trigger the download of the coronavirus ransomware and info-stealer malware Kpot. Once the execution begins, two different files are downloaded, the file1.exe which downloads the Kpot info-stealer and the file2.exe that downloads the coronavirus ransomware. 

What is Kpot malware?

Kpot can steal passwords from browsers, messaging applications, VPNs, gaming accounts like Stream and also steal cookies. It can also fetch information from FTP communication and other login credentials. Kpot has some extra perks that hackers can utilize, like sharing screenshots of the infected computer and getting away with cryptocurrencies from the victim computers. 

What is coronavirus ransomware?

Like any other ransomware, this one encrypts 50 different formats of files in users machines and renames it with ‘coronaVi2022@protonmail.ch___1.jpg’ and in some cases it sends the email in loops to name the files. After encrypting the files, the coronavirus ransomware asks for 0.008 bitcoin as the ransom which is approximately $50. And to spice things up it also renames the C: drive as a coronavirus.

How is coronavirus different from other ransomware variants?

Other ransomware’s primary intentions were to encrypt files and ask for ransom, once paid hackers would share the encryption key or they may not. On the contrary, this ransomware is found to retain wiper attributes meaning it can delete the encrypted files anytime and also the ransomware comes with a info-stealer malware which may sustain in the infected computer making it look tiny compared to the Coronavirus encryption. However, this Kpot malware can steal cookies, login credentials, and more for long time, it can totally spy on the users using its spyware kinda attributes making the threat critical comparatively. Last month we did discuss about another info-stealing malware called ‘Raccon‘ which stole data from 60 different applications.

Users are advised to stay aware of this bogus Wisecleaner website and for those who have been infected by this strain please ensure your have updated your credentials from a different system before it is too late. While most of the ransomware exploits a vulnerability in a system or network this strain is none of that type, hacker crafts a website and distributes the malware so anyone can become a victim to this threat, thus stay alert.

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

Share the article with your friends


Coronavirus ransomwarekpot infostealer malwarekpot malwareRansomwareWhat is Coronavirus ransomware


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Toronto Public Library Faces Ongoing Technical Disruptions from Black Basta Ransomware Attack
November 2, 2023
ABB Confirms Ransomware Attack and Data Breach, Initiates Investigation
May 27, 2023
Action1 RMM exploited for a ransomware attack on MSPs and IT Departments
April 16, 2023
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search