Secles ransomware is malicious software designed to encrypt files on a victim’s system and demand ransom payments in exchange for decryption. It was discovered by cybersecurity researchers during routine inspections of new submissions to platforms like VirusTotal.
Secles ransomware; Extension: .secles (also appends filenames with victim's unique ID and developers' telegram contacts); Ransom notes: ReadMe.txthttps://t.co/Bh8i4VEIrk@LawrenceAbrams @demonslay335 @struppigel @JakubKroustek
— PCrisk (@pcrisk) January 29, 2024
Secles ransomware requires victims to communicate with the attackers via a specified Telegram bot or through a Tor website. Alternative communication methods are provided in case the primary contact information becomes inaccessible. Victims are typically required to pay a ransom to receive the decryption key.
In this article, we explore everything known about the new strain.
WARNING: DO NOT PAY THE RANSOM! Getting the decryption key usually requires the direct involvement of cybercriminals and file recovery is not guaranteed even after paying the ransom.
Confirmed Name
Secles ransomware decryptor
Threat Type
Detection names
Distribution methods
Secles Ransomware uses deceptive distribution methods such as infected email attachments, malicious websites, malvertising, and fake updates to infect victims’ systems. Upon execution, it encrypts files and leaves a ransom note demanding payment for decryption.
Macros are normally helpful shortcuts in programs like Microsoft Word or Excel, but hackers can sneak malicious code into them.
These emails often try to trick you into opening the attachment, unleashing the macro virus. Once activated, it can wreak havoc on your computer, steal data, or even spread to other machines.
Malicious websites can be very convincing, as they often look like regular websites, but their goal is to harm your device or steal your information.
There are two main types:
Malvertising involves using online advertising to spread malware. Hackers sneak malicious code into seemingly normal ads that can appear on legitimate websites you trust.
Clicking or even just viewing the ad can infect your device with malware.
Fake updates pretend to be legitimate software updates but are actually traps set by hackers.
These fake updates can appear in a few ways:
Upon execution, Secles initiates the encryption process, targeting a wide range of file types on the victim’s system. These files are encrypted using cryptographic algorithms, rendering them inaccessible without the decryption key.
The ransomware appends a unique ID, the cybercriminals’ Telegram username, and the ‘.secles’ extension to the filenames of encrypted files. For example, a file named “1.jpg” would be transformed into “1.jpg.id[DYz8jzMo].[t.me_secles1bot].secles.”
Once the encryption process is complete, Secles generates and drops a ransom note named “ReadMe.txt” on the victim’s system. This note contains instructions for contacting the attackers to initiate the decryption process.
Indicators of Compromise (IOCs) are artifacts observed on a network or in an operating system that indicate a computer intrusion with high confidence. IOCs can be used to detect future attack attempts early using intrusion detection systems and antivirus software.
They are essentially digital versions of evidence left at a crime scene, and potential IOCs include unusual network traffic, privileged user logins from foreign countries, strange DNS requests, system file changes, and more. When an IOC is detected, security teams evaluate possible threats or validate its authenticity. IOCs also provide evidence of what an attacker had access to if they did infiltrate the network.
Secles ransomware IOCs include the encryption .secles file extension and the ReadMe.txt ransom note.
Encrypted files are also appended with a unique ID and the cybercriminals’ Telegram username.
The ransom note instructs victims to install Telegram messenger and communicate with the attackers via the specified bot username. It also warns against deleting files, playing with encrypted files, involving middlemen, seeking help from law enforcement, and explains the file encryption process.
It’s crucial that victims do not respond to attackers’ demands. After a ransomware attack, contact law enforcement and a ransomware removal service immediately.
Here’s the content of the Secles ransom note:
The first step to recovering from a Secles ransomware attack is to contact professionals. It’s best to leave every infected machine the way it is and ask for an emergency ransomware removal service. These professionals are equipped to quickly mitigate the damage, gather evidence, potentially reverse the encryption, and restore the system.
Restarting or shutting down the system may compromise the recovery service. Capturing the RAM of a live system may help get the encryption key, and catching a dropper file, i.e. file executing the malicious payload, might be reverse-engineered and lead to decryption of the data or understanding how it operates.
You must not delete the ransomware and keep all evidence of the attack. Digital forensics experts must trace back to the hacker group and identify them. Authorities can investigate the attack by using data from your infected system. A cyber attack investigation is not different from any other criminal investigation: it needs evidence to find the attackers.
Then, you must contact local authorities. In the case of US residents and businesses, they are the FBI and the Internet Crime Complaint Centre (IC3).
To report a malware attack, you must gather every information you can about it, including:
A Cyber Incident Response is the process of responding to and managing a cybersecurity incident. An Incident Response Retainer is a service agreement with a cybersecurity provider that allows organizations to get external help with cybersecurity incidents. It provides organizations with structured expertise and support through a security partner, enabling them to respond quickly and effectively during a cyber incident.
An incident response retainer offers peace of mind to organizations, offering expert support before and in the aftermath of a cybersecurity incident. An incident response retainer’s specific nature and structure will vary according to the provider and the organization’s requirements. A good incident response retainer should be robust but flexible, providing proven services to enhance an organization’s long-term security posture.
If you contact your IR service provider, they can take over immediately and guide you through every step of the ransomware recovery process.
The importance of backup for data recovery cannot be overstated, especially in the context of various potential risks and threats to data integrity.
Backups are a critical component of a comprehensive data protection strategy. They provide a means to recover from various threats, ensuring the continuity of operations and preserving valuable information. In the face of ransomware attacks, where malicious software encrypts your data and demands payment for its release, having a backup allows you to restore your information without succumbing to the attacker’s demands.
Make sure to regularly test and update your backup procedures to enhance their effectiveness in safeguarding against potential data loss scenarios. There are several ways to make a backup, so you must choose the right backup medium and have at least one copy of your data stored offsite and offline.
Contact a data recovery service if you don’t have a backup or need help removing the malware and eliminating vulnerabilities. Paying the ransom does not guarantee your data will be returned to you. The only guaranteed way to restore every file is if you have a backup. If you don’t, ransomware data recovery services can help you decrypt and recover the files.
SalvageData experts can safely restore your files and prevent Secles ransomware from attacking your network again. Contact our recovery experts 24/7.
Preventing malware is the best solution for data security. It is easier and cheaper than recovering from it. Secles ransomware can cost your business its future and even close its doors.
These are a few tips to ensure you can avoid malware attacks:
In a recent data recovery service case, the SalvageData recovery team achieved a remarkable feat…
A corrupted database on PS4 occurs when the system's organized data collection becomes damaged or…
Encountering a black or blank screen on your Windows computer can be frustrating and alarming.…
LockBit ransomware has emerged as one of the most dangerous and prolific cyber threats in…
Recovery mode is a crucial feature for troubleshooting and restoring an iPad when it encounters…
Whether you’re a professional juggling important work documents or an individual cherishing irreplaceable memories, safeguarding…