Monday, April 16th 2018
PUBG Ransomware Forces Users to Play PUBG to Decrypt Their Files
MalwareHunterTeam recently discovered the PUBG ransomware that is currently floating around the internet. When executed, the pesky program would encrypt the files and folders that are located on the victim's desktop and add the ".PUBG" extension to them. While meant to be more of a joke than actual malware, the program demands that the victim play PUBG for an hour. Nevertheless, users can decrypt their files in two ways. They can introduce the "s2acxx56a2sae5fjh5k2gb5s2e" code into the program and proceed to restore their files or launch the PUBG executable for three seconds. MalwareHunterTeam noted that the program runs a background check for a "TslGame" process, and therefore users can rename any executable to TslGame.exe and trick the malware into thinking that the fake executable is the real deal.
Source:
BleepingComputer
12 Comments on PUBG Ransomware Forces Users to Play PUBG to Decrypt Their Files
TPU Staff you can do better
RutinaDeCifrado seems like DecypheringRoutine
BusarArchivos seems like ShearchArchives
Didn't bother to change his default class name Form1 to something meaningful though ... and he detects process only by name (edit: ah, it's what article is about)
"Want to play a cruel joke on your buddies? Send them a copy of the PUBG ransomware."
I don't think it's a good idea to give people ideas, either. There's nothing humorous about this malware.