{"id":38196,"date":"2020-12-23T05:57:21","date_gmt":"2020-12-23T10:57:21","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=38196"},"modified":"2021-09-17T07:33:39","modified_gmt":"2021-09-17T11:33:39","slug":"cyberpunk-2077-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cyberpunk-2077-ransomware\/38196\/","title":{"rendered":"Malware wrapped in Cyberpunk 2077"},"content":{"rendered":"<p>No sooner was <em>Cyberpunk 2077<\/em> released for Windows and consoles than we came across a \u201cbeta version for Android\u201d online. It was completely free to download from a site bearing the name cyberpunk2077mobile[.]com. The game\u2019s actual developer has yet to announce any mobile version of the game, so we decided to investigate.<\/p>\n<h2>Cyberpunk 2077 for Android? No, it\u2019s ransomware<\/h2>\n<p>The website for the alleged mobile version looks nothing like <em>Cyberpunk 2077<\/em>\u2018s official site \u2014 it looks more like Google Play, in fact. Its creators claim the beta version was released on the same day as the official release, and (at the time of this post) had been downloaded about 1,000 times. Some users had even left feedback, saying it wasn\u2019t bad for a beta version.<\/p>\n<div id=\"attachment_38198\" style=\"width: 840px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051620\/cyberpunk-2077-ransomware-screen-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38198\" class=\"size-full wp-image-38198\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051620\/cyberpunk-2077-ransomware-screen-1.png\" alt=\"Shades of Google Play\" width=\"830\" height=\"726\"><\/a><p id=\"caption-attachment-38198\" class=\"wp-caption-text\">Shades of Google Play<\/p><\/div>\n<p>Although the website lists the app\u2019s size at 3.4GB, the file is less than 3MB. Did the developers also create some kind of futuristic compression technology on the side? Not likely.<\/p>\n<p>Moving along, on its initial run, the fake beta requests access to files on the device. In theory, an app might need some file access to save or open something, but no game needs your photos and videos just to load. Nevertheless, this app will not run without the permission.<\/p>\n<p>If a user grants that permission, however, they will see a ransom demand, not the game they wanted.<\/p>\n<div id=\"attachment_38199\" style=\"width: 2210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051627\/cyberpunk-2077-ransomware-screen-2.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38199\" class=\"size-full wp-image-38199\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051627\/cyberpunk-2077-ransomware-screen-2.png\" alt=\"Why does a game need access to your files? To encrypt them, of course!\" width=\"2200\" height=\"1920\"><\/a><p id=\"caption-attachment-38199\" class=\"wp-caption-text\">Why does a game need access to your files? To encrypt them, of course!<\/p><\/div>\n<p>The message is in rather garbled English, and it informs the victim that all of their selfies and other important files are now encrypted. To recover them, the cybercriminals demand $500 in bitcoin within 24 hours. (Or 10 hours. The ransom note mentions both periods.) Anyway, the note continues, if the victim doesn\u2019t deliver the money in time, the malware will permanently erase everything.<\/p>\n<p>According to the note, any attempt to remove the ransomware will be futile and result in the loss of the files.<\/p>\n<h2>Are the encrypted files recoverable?<\/h2>\n<p>We checked to see what really happens to the files on an infected device. The files are indeed encrypted and assigned the extension .coderCrypt. In addition, the malware places a README.txt file, containing the same ransom message, in each folder.<\/p>\n<div id=\"attachment_38200\" style=\"width: 1090px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051637\/cyberpunk-2077-ransomware-screen-3.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38200\" class=\"size-full wp-image-38200\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051637\/cyberpunk-2077-ransomware-screen-3.png\" alt=\"The fake Cyberpunk 2077 for Android does encrypt files \u2014 its creators are honest about that part\" width=\"1080\" height=\"1080\"><\/a><p id=\"caption-attachment-38200\" class=\"wp-caption-text\">The fake <em>Cyberpunk 2077<\/em> for Android does encrypt files \u2014 its creators are honest about that part<\/p><\/div>\n<p>However, the files are recoverable. That\u2019s because the malware uses the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/rc4\/\" target=\"_blank\" rel=\"noopener noreferrer\">RC4<\/a> symmetric encryption algorithm. The <em>symmetric<\/em> part means the same key both encrypts and decrypts the files. In this case, the key was hard-coded into the app, and in all of the samples that we encountered, it was this: 21983453453435435738912738921.<\/p>\n<p>Because RC4 is quite common, it is possible to recover the files for yourself, for example, by using an online RC4 decryption service or contacting our user support team. What\u2019s more, at least for the version of the malware we examined, the 10- (or 24-) hour deadline is completely irrelevant. The ransomware won\u2019t delete anything after a time \u2014 its code contains no such function.<\/p>\n<p>That said, saving a copy of the encrypted files before attempting to restore them is worth your time, just in case the recovery utility fails.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kts-dm-ransomware\">\n<h2>Cyberpunk 2077 ransomware: Windows version<\/h2>\n<p>Regrettably, files encrypted by ransomware are not always easy to recover. For example, the authors of the fake beta <em>Cyberpunk 2077<\/em> for Android are also distributing <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1331921031406235655\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ransomware for Windows<\/a> disguised as the same game. In that case, however, the key is not hard-coded into the app, but randomly generated for each infection case, so victims have no easy way to decrypt affected files.<\/p>\n<div id=\"attachment_38201\" style=\"width: 1425px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051643\/cyberpunk-2077-ransomware-screen-4.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38201\" class=\"size-full wp-image-38201\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/12\/23051643\/cyberpunk-2077-ransomware-screen-4.png\" alt=\"The ransom note for Windows users demands $1,000 in bitcoin for decryption\" width=\"1415\" height=\"748\"><\/a><p id=\"caption-attachment-38201\" class=\"wp-caption-text\">The ransom note for Windows users demands $1,000 in bitcoin for decryption<\/p><\/div>\n<h2>Should you pay up?<\/h2>\n<p>At the time of this writing, <a href=\"https:\/\/www.blockchain.com\/btc\/address\/336Fvf8fRrpySwq8gsaWdf7gfuGm5FQi8K\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">more than $8,000<\/a> in bitcoin had been transferred to the cybercriminals\u2019 wallet. Meanwhile, file recovery is <a href=\"https:\/\/www.kaspersky.com\/blog\/no-no-ransom\/13364\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">in no way guaranteed<\/a>. The ransomware creators might simply disappear with the money or, finding victims willing to pay, demand more. Therefore, we strongly advise against paying the ransom.<\/p>\n<p>Kaspersky experts help ransomware victims by studying malicious code and inventing ways to decrypt files \u2014 in other words, we write free decryptors. You can find many of them on the <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NoMoreRansom<\/a> website, created specially to counter such attacks, or <a href=\"https:\/\/support.kaspersky.com\/viruses\/utility\" target=\"_blank\" rel=\"noopener noreferrer\">on our support website<\/a>. If you do get hit by ransomware, make those resources your first port of call. Even if no decryptor exists for your particular problem yet, it is possible, even likely, that one will appear in due course with a corresponding utility.<\/p>\n<h2>How to stay safe from ransomware<\/h2>\n<p>The best tip, obviously, is to avoid ransomware in the first place \u2014 even ransomware temptingly disguised as a popular game. To protect yourself, observing basic digital hygiene may suffice.<\/p>\n<ul>\n<li>Download apps only from official stores or from the developer\u2019s official website.<\/li>\n<li>Scan for news of beta versions, releases, and promotions on the developer\u2019s website. If the developer has no information, or the game <a href=\"https:\/\/www.kaspersky.com\/blog\/apex-legends-mobile-fakes\/25836\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">is not officially out yet<\/a>, anything else is fake.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a> on all devices to catch malware before it can do any harm. For example, our products nail the fake\u2013<em>Cyberpunk 2077<\/em> ransomware for Android with the verdict HEUR:Trojan-Ransom.AndroidOS.Agent.bs, and the version for Windows as Trojan-Ransom.Win32.Alien.ao.<\/li>\n<li>Back up important files so you can recover them promptly in case of damage or loss.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kts-dm-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.<\/p>\n","protected":false},"author":2492,"featured_media":38197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,1680,4004,647,420,723],"class_list":{"0":"post-38196","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-cryptors","10":"tag-cyberpunk-2077","11":"tag-gamers","12":"tag-ransomware","13":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberpunk-2077-ransomware\/38196\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberpunk-2077-ransomware\/22312\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberpunk-2077-ransomware\/17806\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberpunk-2077-ransomware\/23992\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyberpunk-2077-ransomware\/22077\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cyberpunk-2077-ransomware\/20776\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cyberpunk-2077-ransomware\/24446\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cyberpunk-2077-ransomware\/23632\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cyberpunk-2077-ransomware\/29873\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cyberpunk-2077-ransomware\/9170\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cyberpunk-2077-ransomware\/16170\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cyberpunk-2077-ransomware\/14321\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cyberpunk-2077-ransomware\/25987\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cyberpunk-2077-ransomware\/29803\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cyberpunk-2077-ransomware\/26535\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cyberpunk-2077-ransomware\/23340\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberpunk-2077-ransomware\/28675\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberpunk-2077-ransomware\/28484\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2492"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=38196"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38196\/revisions"}],"predecessor-version":[{"id":42011,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38196\/revisions\/42011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38197"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=38196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=38196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}