Daily Dark Web
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
Daily Dark Web
No Result
View All Result
Home DarkWeb News & Services

New Ransomware Threat Detected on Forums: SpiderX Ransomware

May 27, 2024
Reading Time: 2 mins read
New Ransomware Threat Detected on Forums: SpiderX Ransomware

After months of development, a new ransomware called SpiderX has been announced as the successor to the infamous Diablo ransomware. The creator claims that SpiderX includes all the features of Diablo plus additional enhancements, making it a more potent threat. Priced at $150 and accepting payments in Bitcoin and Monero, SpiderX is poised to cause significant damage across various systems.

Features of SpiderX Ransomware

Advanced Encryption:

  • ChaCha20-256 Algorithm: SpiderX uses the ChaCha20-256 encryption algorithm, touted as the fastest in the world. This method takes significantly less time than the commonly used AES-256, making it more efficient in encrypting files quickly.

Comprehensive Targeting:

  • Broad Attack Surface: Similar to its predecessor Diablo, SpiderX not only targets main user folders on the Windows drive but also extends its reach to external partitions, drivers, USBs, and other connected devices. This extensive targeting ensures that a wide range of data is compromised.

Offline Operation:

  • No Internet Connection Required: Unlike many other ransomware strains, SpiderX can operate completely offline. Once executed, it quickly encrypts files within seconds, without needing an internet connection.

Custom Payload:

  • Embedded Wallpaper: The ransomware payload includes a custom wallpaper embedded directly, ensuring that it is not just a basic script downloading files from a server. This makes the attack more seamless and difficult to detect.

Efficient Execution:

  • Written in C++: SpiderX is developed in C++, which offers faster execution compared to other programming languages like C# or Python. This results in quicker deployment and execution of the ransomware.

Persistent Threat:

  • Continuous Background Operation: Once deployed, SpiderX remains persistent, running silently in the background and continuously encrypting any new files. Additionally, any USB drive or external device connected after the initial attack will also be infected, enhancing the attacker’s control.

Data Exfiltration:

  • File Stealer Capability: Unlike Diablo, SpiderX includes a file stealer feature that exfiltrates data from the target system, compresses it into a zip file, and sends it to the attacker’s Mega account. It then covers its tracks to avoid detection.
SpiderX ransomware is a significant advancement over its predecessor, Diablo, and poses a considerable threat to cybersecurity. Detected on underground forums, it highlights the ongoing evolution of ransomware tactics and the need for enhanced security measures.
Tags: malwarephant0mransomwareSpiderXthreat
ShareTweet

Related Posts

Marks & Spencer Faces Estimated £300 Million Profit Hit Following Cyberattack
Ransomware News

Marks & Spencer Faces £300 Million Profit Hit Following Ransomware Attack

May 21, 2025
Real Estate Giant Landmark Properties Allegedly Hit by Morpheus Ransomware
Ransomware News

Real Estate Giant Landmark Properties Allegedly Hit by Morpheus Ransomware

May 20, 2025
Allegations Emerge of a Massive 1.2B Facebook Data Leak on the Dark Web
DarkWeb News & Services

Allegations Emerge of a Massive 1.2B Facebook Data Leak on the Dark Web

May 20, 2025
Alleged Breach Exposes Data of 88 Million Indian Car Owners
DarkWeb News & Services

Alleged Breach Exposes Data of 88 Million Indian Car Owners

May 15, 2025
Alleged Data Exposure Hits Indonesian Supreme Court
DarkWeb News & Services

Alleged Data Exposure Hits Indonesian Supreme Court

May 15, 2025
China Census Database Allegedly Leaked with 92 Million Records
DarkWeb News & Services

China Census Database Allegedly Leaked with 92 Million Records

May 14, 2025
Next Post
A Threat Actor Claims to Have Leaked Database of AC Propulsion Company; Exposes Over 29 Million User Records

A Threat Actor Claims to Have Leaked Database of AC Propulsion Company; Exposes Over 29 Million User Records

Hacktivist Group GlorySec Targets Venezuelan Websites

Hacktivist Group GlorySec Targets Venezuelan Websites

Recommended Stories

National Curry Awards Allegedly Targeted by Moroccan Threat Actors

National Curry Awards Allegedly Targeted by Moroccan Threat Actors

August 8, 2024
Threat Actor Claims to Sell Unauthorized VPN Access to a European Country’s Ministry of Rural Development and Food

Threat Actor Claims to Sell Unauthorized VPN Access to a European Country’s Ministry of Rural Development and Food

May 31, 2024
Cybercriminal Offers Access to Spanish Crypto Exchange’s Admin Panel for $10,000 in Monero

Cybercriminal Offers Access to Spanish Crypto Exchange’s Admin Panel for $10,000 in Monero

March 15, 2024

Popular Stories

  • Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims to Have Leaked Database Containing Personal Information of 5 Million Salvadoran Citizens

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims Sale of State Grid Corporation of China (SGCC) Data, World’s Largest Utility Company

    0 shares
    Share 0 Tweet 0
  • New ATM Malware Threatens European Banking Security

    0 shares
    Share 0 Tweet 0
  • CyberNiggers Group Allegedly Breaches HSBC and Barclays Banks, Compromising Extensive Databases and Source Code

    0 shares
    Share 0 Tweet 0
Daily Dark Web

Daily Dark Web© 2024

No Result
View All Result
  • Contact
  • Home
  • Newsletter
  • Privacy Policy

Daily Dark Web© 2024

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?