Black Ruby

NJCCIC Threat Profile

Original Release Date: 2018-02-22

Black Ruby, detected by MalwareHunterTeam, targets Windows OS, scrambles file names and appends .BlackRuby to the names of encrypted files. This ransomware geographically targets victims by scanning for the target machine’s country code and only infects devices that do not appear to be located within Iran. Black Ruby delivers a Monero-miner to infected computers and is likely distributed via Remote Desktop Protocol (RDP). A ransom note named HOW-TO-DECRYPT-FILES.txt is placed on the Windows desktop which provides an email address of TheBlackRuby[@]Protonmail[.]com. The current ransom amount is $650 USD in Bitcoin.

  • Bleeping Computer provides additional information on Black Ruby here.
  • The NJCCIC is not currently aware of any free decryption tools available for Black Ruby.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.