0 0
Read Time:1 Minute, 4 Second

فيروس فدية Ransomware مبني بلغة PHP ، “مفتوح المصدر” لتشفير ملفات الخادم Server.

PHP Ransomware

PHP ransomware that encrypts your files, as well as file and directory names.

Ransomware is set to start encrypting files and directories from the server’s web root directory and only inside the server’s web root directory.

Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.

Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.

Tested on XAMPP for Windows v7.4.3 (64-bit) with PHP v7.4.3.

Made for educational purposes. I hope it will help!

IMPORTANT!: Please DO NOT use this ransomware for illegal purposes! I have no liability over your actions!

How to Run

Requires PHP v5.5.0 or greater because openssl_pbkdf2() is being used.

Care not to do any damage! Backup your server files before running ransomware! Script will crash on large files!

Copy \src\encrypt.php to your server’s web root directory (e.g. to \xampp\htdocs\ on XAMPP).

Navigate to the encryption file with your preferred web browser.

Decryption file will be created automatically after the encryption phase.

https://github.com/ivan-sincek/php-ransomware

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence