BusinessCybersecurityNewswireTechnology

New Lockbit 3.0 Ransomware Uses .G5xG4GUv2 Extension

▼ Summary

– A ransomware infected a Windows 10 computer in a car workshop, encrypting local files and network shared folders after work hours.
– The infection exploited weak security, including no backups, outdated Windows versions, and reused “ADMIN” credentials across the network.
– A ransom note provides a decryption ID and contact details, offering to decrypt a small file for free as proof.
– Norton support deleted many files from the Downloads folder, complicating recovery efforts.
– The ransomware is unidentified by ID Ransomware, with a provided SHA1 hash for further analysis.

A car repair shop recently faced a major disruption when one of its computers was hit by a sophisticated ransomware attack. The incident highlights the critical importance of robust backup strategies and up-to-date network security protocols, especially for small businesses relying on outdated systems. Without these defenses, companies remain highly vulnerable to encryption-based attacks that can halt operations entirely.

The infection struck after business hours, targeting a Windows 10 machine that still used stored administrative credentials for network access. This allowed the malware to not only encrypt local files, including databases, program files, and documents, but also to map every network shared folder accessible with those credentials. Files across the system were locked and appended with the extension .G5xG4GUv2, a signature associated with this newly identified threat.

A ransom note left on the system demanded payment in exchange for decryption, providing a unique identifier and instructions to contact the attackers via a specified method. The note included an offer to decrypt one or two small files free of charge as “proof” that recovery was possible, a common tactic used to lend credibility to these extortion attempts.

Prior to the discovery, the user had contacted Norton support, where an agent unfortunately deleted numerous files from the Downloads folder, a move that may have complicated potential data recovery efforts. Initial analysis through ID Ransomware could not identify the strain, though its SHA-1 hash was recorded for further investigation.

This situation underscores how dangerous it can be to operate with obsolete software, weak access controls, and no reliable backups. For businesses in similar positions, the immediate steps should include isolating affected devices, auditing network permissions, and consulting cybersecurity professionals specializing in ransomware response. While decryption may not yet be publicly available, exploring all options before considering payment is strongly advised.

(Source: Bleeping Computer)

Topics

ransomware infection 100% it security 95% file encryption 90% network vulnerabilities 90% backup issues 85% network shares 85% windows systems 80% ransom note 80% norton 360 75% decryption id 70%

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.