Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered

Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered

Posted on November 17, 2025November 17, 2025 By CWS

A brand new risk has emerged within the ransomware panorama with the invention of Yurei ransomware, first publicly recognized in early September 2025.

This Go-based malware follows a typical ransomware operation mannequin by infiltrating company networks, encrypting vital knowledge, deleting backups, and demanding ransom for stolen info.

The group operates by a devoted darkish web page the place they contact victims and negotiate fee phrases primarily based on the monetary standing of every focused firm.

The recognized victims of Yurei ransomware assaults embrace organizations in Sri Lanka and Nigeria, with major targets in transportation and logistics, IT software program, advertising and marketing and promoting, and meals and beverage industries.

Not like many fashionable ransomware operations, there is no such thing as a clear proof linking Yurei to Ransomware as a Service fashions or collaboration with different cybercrime teams.

The risk actors calculate ransom calls for on a case-by-case foundation after reviewing the sufferer’s monetary place, although particular ransom quantities haven’t been publicly disclosed.

ASEC safety researchers recognized that Yurei ransomware stands out for its subtle encryption method.

The malware makes use of the ChaCha20-Poly1305 algorithm for file encryption, producing a 32-byte key and a 24-byte nonce as random values.

These encryption keys are then protected utilizing the secp256k1-ECIES technique with an embedded public key, making certain solely the risk actor holding the corresponding non-public key can decrypt information.

Yurei ransomware DLS web site (Supply – ASEC)

This dual-layer encryption design makes unauthorized decryption just about unattainable with out paying the ransom.

File Encryption Mechanism

The encryption course of begins with Yurei scanning the contaminated system to establish all accessible drives and potential encryption targets.

The ransomware intentionally excludes vital system directories like Home windows, System32, and Program Recordsdata to stop full system failure.

It additionally skips information with extensions comparable to .sys, .exe, .dll, and .Yurei (its personal encrypted file marker) to keep away from re-encrypting already compromised information.

Recordsdata are encrypted in 64 KB block items utilizing ChaCha20-Poly1305, with the encrypted key and nonce saved at first of every file utilizing the “||” delimiter.

The secp256k1-ECIES encryption technique employed by Yurei makes use of Elliptic Curve Diffie-Hellman to create a shared secret, which is then reworked by a key derivation operate to function the AES-GCM encryption key.

A randomly generated non permanent nonce ensures totally different encryption outcomes every time, stopping victims from making an attempt unbiased restoration.

The ransom notice, saved as “_README_Yurei.txt”, threatens to delete the decryption key and leak stolen knowledge together with databases, monetary paperwork, and private info on the darkish internet if victims fail to reply inside 5 days.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Data, Encryption, File, Methods, Model, Operation, Ransomware, Transfer, Uncovered, Yurei

Post navigation

Previous Post: Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants
Next Post: Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems

Related Posts

Scripted Sparrow Uses Automation to Generate and Send their Attack Messages Scripted Sparrow Uses Automation to Generate and Send their Attack Messages Cyber Security News
WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups Cyber Security News
Phishing Campaign Uses Maduro Arrest Story to Deliver Backdoor Payloads Phishing Campaign Uses Maduro Arrest Story to Deliver Backdoor Payloads Cyber Security News
Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials Cyber Security News
Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News