{"id":90874,"date":"2022-06-13T18:36:21","date_gmt":"2022-06-13T13:06:21","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=90874"},"modified":"2023-10-17T15:29:28","modified_gmt":"2023-10-17T09:59:28","slug":"a-new-ransomware-goodwill-hacks-the-victims-for-charity-read-more-to-know-more-about-this-ransomware-and-how-it-affects-its-victims","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/a-new-ransomware-goodwill-hacks-the-victims-for-charity-read-more-to-know-more-about-this-ransomware-and-how-it-affects-its-victims\/","title":{"rendered":"Robin Hood Ransomware \u2018GOODWILL\u2019 Forces Victim for Charity"},"content":{"rendered":"<p><span data-contrast=\"auto\">Goodwill <a href=\"https:\/\/blogs.quickheal.com\/activists-turn-hacktivists-new-ransomware-that-does-not-demand-money\/\">Ransomware<\/a>, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet. It is known to encrypt documents, databases, videos, or photos after it infects the whole system. The files become inaccessible for the victims, where Robinhood&#8217; Goodwill&#8217; asks the victim to donate for socially driven activities to get their files back. For example: &#8216;Goodwill Ransomware forces victims to donate new clothes to the homeless, provide financial assistance to the poor, and many more. They then ask victims to post it online. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, a few more ransomware have other motives to force victims to do some act to retrieve their infected files. Quick heal published a blog about Sarbloh Ransomware related to the Farmer Protests and was not demanding any ransom. Similarly, Goodwill ransomware acts as a Robin Hood and forces victims to help the poor. Let us look into more detail about this ransomware and how the attacker gets hold of the files in the system.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Technical Analysis<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Let us analyse the hash (MD5: <\/span><span data-contrast=\"none\">cea1cb418a313bdc8e67dbd6b9ea05ad). This is a .NET Compiled file. This executable is packed with Fody; hence we can see only the main routine.<\/span><br \/>\n<span data-contrast=\"none\">We can also observe references to Costura.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-90902\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1-650x253.jpg\" alt=\"\" width=\"650\" height=\"253\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1-650x253.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1-300x117.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1-768x299.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1-1536x597.jpg 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1-789x307.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Inkedscreenshot_LI-1.jpg 1600w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<i><span data-contrast=\"none\">Fig 1: Costura References<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This Costura is a plugin for Fody that allows the developers to embed all the dependencies in the form of resources packed inside the final dotNET executable.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90905 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/14-602x390.png\" alt=\"\" width=\"602\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/14-602x390.png 602w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/14-300x194.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/14-768x497.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/14-789x511.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/14.png 851w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Fig2: Plugin<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It can be seen in the above image how the embedded dependencies are fetched and unpacked.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Upon execution it connects to URL hxxp[:]\/\/9855-13-235-50-147.ngrok[.]io\/alertmsg[.]zip and downloads alertmsg.zip file into location: C:\\Users\\Public\\Windows\\Ui<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">All the content related to Ransom notes and encryption information is in the zip file. This executable coordinates with the contents of the zip. It encrypts the files with the extension &#8220;.gdwill.&#8221;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00a0To recover the files, 3 activities need to be performed as shown below:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90942 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Capture-650x323.png\" alt=\"\" width=\"650\" height=\"323\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Capture-650x323.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Capture-300x149.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Capture-768x382.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Capture-789x393.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/Capture.png 995w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90943 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/2-1-650x291.png\" alt=\"\" width=\"650\" height=\"291\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/2-1-650x291.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/2-1-300x134.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/2-1-768x344.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/2-1-789x354.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/2-1.png 1252w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90944 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/3-650x240.png\" alt=\"\" width=\"650\" height=\"240\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/3-650x240.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/3-300x111.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/3-768x283.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/3-789x291.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/3.png 1182w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90945 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/4-1-650x267.png\" alt=\"\" width=\"650\" height=\"267\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/4-1-650x267.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/4-1-300x123.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/4-1-768x316.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/4-1-789x325.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/4-1.png 1237w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-90946\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/5-2-650x309.png\" alt=\"\" width=\"650\" height=\"309\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/5-2-650x309.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/5-2-300x142.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/5-2-768x365.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/5-2-789x375.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/5-2.png 1243w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><span data-contrast=\"auto\">\u00a0 \u00a0\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Fig 3:\u00a0 Ransom note<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">After completing all the given activities, the details must be sent to the email in the below format:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-90947\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/6-2-650x304.png\" alt=\"\" width=\"650\" height=\"304\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/6-2-650x304.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/6-2-300x140.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/6-2-768x359.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/6-2-789x369.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/6-2.png 1179w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Fig 4: Email Format<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The ransomware attackers ask the victims to provide convincing evidence for the activities to prove it done. After which, the person orchestrating this threat will provide a decryption tool to recover the stolen files. Let us look at how the threat actors hack and encrypt the files via the given below snapshot.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90941 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/screenshot1-650x356.png\" alt=\"\" width=\"650\" height=\"356\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/screenshot1-650x356.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/screenshot1-300x164.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/screenshot1-768x421.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/screenshot1-789x433.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/screenshot1.png 1100w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Fig 6: Encryption<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Encryption Process<\/h3>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a01.<\/span><span data-contrast=\"auto\">GeneratePassword: A password is randomly generated and then base64 encoded. The SHA256 of this base64 encoded data which later forms the key for encryption (AES)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">2. GenerateSystemId: SystemID of the victim&#8217;s machine is obtained<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">3. CheckConnection: Pings google.com and checks if the internet is working<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">4. MakeConnection: Uploads the password and SystemID to the server along with location and IP<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">5.RetrieveFiles: AES Encryption is done on files with extension with a key generated in Step1 .pptx,.docx,.xlsx,.txt,.pdf,.500,.jpeg,.jpg,.png<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">6. AlertingUser: Launches index.html(containing ransom note) via launch.bat present in the alertmsg.zip<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-90885 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/9-650x44.png\" alt=\"\" width=\"650\" height=\"44\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/9-650x44.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/9-300x20.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/9-768x51.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/9-789x53.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/06\/9.png 926w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Fig 7: Batch file for alert<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> This malware also sleeps for a few seconds to bypass the analysis.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At last, it was found that this ransomware was derived from an Open-source Jasmin Encryptor, which can be found on <\/span><a href=\"https:\/\/github.com\/codesiddhant\/Jasmin-Ransomware\"><span data-contrast=\"none\">https:\/\/github.com\/codesiddhant\/Jasmin-Ransomware<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">How do we prevent such kinds of attacks?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">To keep ourselves secure from such attacks, follow the great saying\u202f &#8220;Prevention is better than Cure&#8221;! The infection vector is usually in the form of mails, so do not open attachments from an untrusted sender. Do not enable macros in the Doc received mainly from correspondences. Avoid clicking on unverified links and those in spam emails. Keep your software and antivirus updated. Always remember to back up your data so that you can recover it even in case of a ransomware attack.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Conclusion<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">In the content above, we have looked into how Goodwill Ransom is related to Open-source Jasmin. It has modified the open-source for, e.g., In Jasmin, files are encrypted with the &#8220;.jasmin&#8221; extension, whereas GoodWill files are encrypted with &#8220;.gdwill.&#8221; In Jasmin, hosted points to localhost, whereas Goodwill points to external C2. This ransomware was unique because of its charitable nature instead of demanding money.\u202fThe strings present in the file, such as &#8220;Error h bhaiyya,&#8221; seems that the routes of this hack were generated in India. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Indicators of compromise (IOC)<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">cea1cb418a313bdc8e67dbd6b9ea05ad<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"none\">QuickHeal Protection<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Trojan.YakbeexMSIL.ZZ4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Goodwill Ransomware, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet. It is known to encrypt documents, databases, videos, or photos after it infects the whole system. The files become inaccessible for the victims, where Robinhood&#8217; Goodwill&#8217; asks the victim to donate for socially driven activities to get [&hellip;]<\/p>\n","protected":false},"author":85,"featured_media":90960,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,910,1],"tags":[1912,1913,534,58,50],"class_list":["post-90874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-ransomware","category-uncategorized","tag-goodwill","tag-ransomwareprevention","tag-cybersecurity","tag-hacking","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90874"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=90874"}],"version-history":[{"count":23,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90874\/revisions"}],"predecessor-version":[{"id":91388,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90874\/revisions\/91388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/90960"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=90874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=90874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=90874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}