![]() ![]() Note that Atom's builder is more user-friendly, since it has a GUI (Graphical User Interface) - the previous version (Shark) required configuration via a terminal-based builder. Most RaaS services are modified within the download website - wannabe cyber criminals create an account, configure all settings, and download a malicious executable.Ītom's website provides a download link to a 'builder' (configuration tool), which generates the malicious executable on the user's computer. Research shows that one of the major differences between Atom and other RaaS is the settings' modification process. locked" extension to the name of each encrypted file (e.g., " sample.jpg" is renamed to " ").įollowing successful encryption, Atom generates an executable file (" UNLOCK DATA.exe"), which opens a ransom-demand pop-up window, and places it in each folder containing encrypted files. Once Atom infiltrates computers, it encrypts various file formats using asymmetric cryptography and appends a ". In addition, the entire creation process requires no computer programming knowledge.Ītom has an official download website and is free of charge. It allows regular users to create their own version of ransomware-type viruses with little effort. Atom is advertised as a great choice for wannabe cyber criminals. ![]() ![]() Atom is an updated version of a "Ransomware as a Service (RaaS)" called Shark.
0 Comments
Leave a Reply. |