Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Philadelphia (ransomware)

From Wikipedia, the free encyclopedia
Encrypting ransomware created in 2016
Philadelphia
Malware details
TypeRansomware
SubtypeCryptoviral extortion
ClassificationTrojan horse
FamilyStampado
Isolation date2016
AuthorThe Rainmaker
Cyberattack event
DateSeptember 2016
Technical details
PlatformWindows
Written inAutoIt[1]

"Philadelphia" is a type of encryptingransomwaremalware created in 2016.[2] It was originally sold and distributed by the Brazilianhacker group, The Rainmaker,[3][4] but has since circulated on thedark web. Like many forms of ransomware, the malware encrypts computer files and gradually deletes them, demanding abitcoin ransom to decrypt the files and halt the deletion process.

History

[edit]

Philadelphia was introduced in September 2016, when it was sold as-a-service by The Rainmaker.[2] Promotion began shortly after its release, using spam campaigns viaonline forums to encourage sales.[3] According to theNational Health Service, following the release, the author has sold 38 copies of the malware, each for $389 USD.[5] It was intended to cause harm and generate income through malicious email attachments, compromised websites, macros, Trojanized downloads, and other illegal methods. It activates when users download the software, which encrypts all local user files.[5] A companionwebsite known as "Philadelphia Headquarters" allows attackers to offer a "mercy" option through the program. If chosen, it decrypts their files for free.[6][7] The malware features many similarities toStampado, another type ofransomware.

Attackers often target thehealthcare industry, purposely sendingspear-phishing emails to hospitals.[8] Roland Dela Paz, a cybersecurity professional, stated that the ransomware affected a hospital inSouthwest Washington and one inOregon.[9]

Reception

[edit]

JournalistBrian Krebs, on his website,Krebs on Security, described an advertisement for the malware as "fairly chilling."[10] Additionally, noting that the ransomware’s "mercy" feature revolved around pleas from victims who risked losing irreplaceable personal data.Sophos stated that "kits available on the Dark Web allow the least technically savvy among us to do evil." CallingPhiladelphia one of the "slickest, most chilling examples."

References

[edit]
  1. ^https://www.emsisoft.com/en/ransomware-decryption/philadelphia/
  2. ^ab"Philadelphia Ransomware | WatchGuard Technologies".www.watchguard.com. 2023-02-25. Retrieved2026-01-17.
  3. ^ab"The Rainmaker, Philadelphia and Stampado Ransomware Vendor is Expanding his Services".www.clearskysec.com. Retrieved2026-01-17.
  4. ^"Ransomware: Now available with slick marketing".ZDNET. Retrieved2026-01-17.
  5. ^ab"Philadelphia ransomware".NHS England Digital. Retrieved2026-01-17.
  6. ^"Philadelphia Ransomware Allows Attackers to Offer "Mercy" | Tripwire".www.tripwire.com. Retrieved2026-01-17.
  7. ^Abrams, Lawrence."The Philadelphia Ransomware offers a Mercy Button for Compassionate Criminals".BleepingComputer. Retrieved2026-01-17.
  8. ^Paganini, Pierluigi (2017-04-07)."Philadelphia Ransomware, a new threat targets the Healthcare Industry".Security Affairs. Retrieved2026-01-17.
  9. ^Seals, Tara (2017-04-12)."Philadelphia Ransomware Sets Sights on Healthcare".Infosecurity Magazine. Retrieved2026-01-17.
  10. ^"Ransomware for Dummies: Anyone Can Do It – Krebs on Security". 2017-03-03. Retrieved2026-01-17.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=Philadelphia_(ransomware)&oldid=1333585756"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp