Security News > 2022 > November > Ukraine says Russian hacktivists use new Somnia ransomware
Russian hacktivists have infected multiple organizations in Ukraine with a new ransomware strain called 'Somnia,' encrypting their systems and causing operational problems.
The group previously disclosed creating the Somnia ransomware on Telegram and even posted evidence of attacks against tank producers in Ukraine.
Until today, Ukraine has not confirmed any successful encryption attacks by the hacking group.
The agency also notes that the latest samples of the Somnia ransomware strain used in these attacks rely on the AES algorithm, whereas Somnia initially used the symmetric 3DES. The file types targeted by Somnia ransomware are shown below, including documents, images, databases, archives, video files, and more, reflecting the destruction this strain aims to cause.
Somnia extension to the encrypted file's names when encrypting files.
Somnia does not request the victims to pay a ransom in exchange for a working decryptor, as its operators are more interested in disrupting the target's operations than generating revenue.
News URL
Related news
- Russian suspected Phobos ransomware admin extradited to US over $16M extortion (source)
- Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested (source)
- UK disrupts Russian money laundering networks used by ransomware (source)
- FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine (source)
- Russian Turla hackers hit Starlink-connected devices in Ukraine (source)
- Russian cyber spies hide behind other hackers to target Ukraine (source)
- US charges Russian-Israeli as suspected LockBit ransomware coder (source)