Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Fantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading it, thereby paving the way for data breach…
Malware researcher Jakub Kroustek of security firm AVG has discovered this rather sophisticated malware.
Ransomware, as we know, refers to the malware that helps hackers block systems and encrypt users’ files in such a way that they cannot be opened or used. Ransomware also stops apps from running. Thus the person who is affected will have to pay a ransom to the hacker(s) to get his system back on track or to open and use files and apps. Ransomware attacks are increasing in number these days; many are the organizations that have fallen prey to ransomware attacks in recent months.
How Fantom Works…
Fantom, which is a ransomware based on the open-source EDA2 ransomware project, appears displaying a fake Windows Update Screen. This update screen leads you into believing that Windows is installing a new critical update. Even the file properties for the ransomware would make you believe that, stating that it’s from Microsoft and will have the file description as ‘Critical Update’.
Led into believing that it’s a genuine Windows update, you might execute it. This will make the ransomware extract and execute another embedded program called WindowsUpdate.exe and then a fake Windows Update screen will be displayed. This screen will overlay all active Windows and you won’t be able to switch to any other open application. You’d see on this update screen a percentage that leads you into believing that the Windows update is taking place while in reality your files are being encrypted as the percentage increases. Though Ctrl+F4 key combination could help you close this screen if you want, the file encryption would carry on in the background.
Fantom, like other EDA2-based ransomware, will generate a random AES-128 key and encrypt it using RSA. Then it will be uploaded into the Command & Control server of the malware developers. Then it scans local drives for files that contain targeted file extensions. These files are encrypted using AES-128 encryption, to each encrypted file will be added the extension .fantom. In folders wherein Fantom encrypts files, a ransom note DECRYPT_YOUR_FILES.HTML will also be created. When the encryption is done, Fantom will create two batch files that are executed; these will delete the shadow volume copies and the fake update screen which you had got earlier.
Then finally comes the ransom note called DECRYPT_YOUR_FILES.HTML. This will have the mention that restoring your data would be possible only by buying passwords from them. There will be the instructions to email firstname.lastname@example.org or email@example.com so that you could receive payment instructions. You’re also warned not to try to restore files saying that it could destroy your data completely.
Though hackers use different tactics to strike with ransomware, the strategy used in the case of Fantom is a clever one. The attackers mimic a screen that most users, including business users, recognize and even trust; it’s comparatively easy to lead people into believing that they are getting a legitimate Windows update and thus lead them to download Fantom. This could be a pointer to a rather dangerous trend as regards malware in general and ransomware in particular.
Ransomware Protection Software
Reading Time: 2 minutes Overview One of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in 2017. The government, education, hospitals, energy, communications, manufacturing and many other key information infrastructure sectors suffered unprecedented losses.Looking back, thatwas just the beginning, as there have since been many versions, such asSimpleLocker, SamSam and WannaDecryptor for…
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting ready for Halloween parties and trick-or-treating. But ghosts and ghouls aren’t the only scary things you’ll be seeing this month: October is also National Cybersecurity Awareness Month, a time when business leaders and…
Reading Time: 3 minutes Two months have passed since the city of Baltimore was hit by the latest in a string of ransomware attacks targeting municipalities, and things still aren’t completely back to normal. The attack, perpetrated by an unknown cyber criminal, impacted over 10,000 municipal government-owned computers, and disrupted tax collection and city employees’ access to their email…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats