When launched, the ransomware will encrypt all files except those ending with the .dll or .exe file extensions.
The ransomware will also not encrypt files or folders in the list below:
Program Files (x86)
When encrypting files, Night Sky will append the .nightsky extension to encrypted file names.
In each folder a ransom note named NightSkyReadMe.hta contains information related to what was stolen, contact emails, and hard coded credentials to the victim’s negotiation page.
Instead of using a Tor site to communicate with victims, Night Sky uses email addresses and a clear web website running Rocket.Chat.
The credentials are used to log in to the Rocket.Chat URL provided in the ransom note.
A common tactic used by ransomware operations is to steal unencrypted data from victims before encrypting devices on the network.
The threat actors then use this stolen data in a “double-extortion” strategy, where they threaten to leak the data if a ransom is not paid.
To leak victim’s data, Night Sky has created a Tor data leak site that currently includes two victims, one from Bangladesh and another from Japan.
After reverse engineering the malware, Jiří Vinopal – forensic analyst at the Czech Republic CERT, discovered that Night Sky is a fork of the Rook ransomware.
Sign Up For Threat Alerts
Dec 08, 2022
Trigona (._locked) ransomware virus
Trigona is ransomware that encrypts files and appends the "._locked" extension to filenames. Also, it...
Dec 08, 2022
Threat Actors Target Exposed Remote Desktop Protocol...
Threat actors were discovered targeting open Remote Desktop Protocol (RDP) ports with variants from a...
Dec 07, 2022
Redigo Backdoor Malware Targets Redis Servers
The Redigo backdoor is written in the Go programming language and targets Redis servers vulnerable...
Dec 06, 2022
DuckLogs MaaS (Malware-as-a-Service) Provides Sophisticated Features
DuckLogs is MaaS (Malware-as-a-Service) advertised on cybercrime forums with a range of features including remote...
Dec 05, 2022
WannaRen Returns As Life Ransomware
WannaRen ransomware appeared on the threat landscape in 2020 and reemerged in 2022 as Life...
Dec 04, 2022
Alert (AA22-335A) Cuba Ransomware
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are...
Dec 01, 2022
UNC4191 Threat Group Targets Entities In The...
The UNC4191 threat group was discovered targeting entities in the Philippines with custom malware and...
Nov 30, 2022
Emotet Leads To Quantum Ransomware Infection
Threat actors were observed using Emotet to gain access to the victim's network and deploy...
Nov 29, 2022
RansomExx Upgrades to Rust
IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that...
Nov 29, 2022
Ransomware Roundup: Cryptonite Ransomware
FortiGuard Labs has reported on Cryptonite ransomware, which was found to target Microsoft Windows machines...
Nov 28, 2022
Operation Typhoon: The Cyber Sea Lotus Coveting...
Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intrusions...
Nov 27, 2022
IL-Cert Alert – Active phishing campaign in...
There is a new phishing campaign in Israel. The malware relies upon user execution. The...
Nov 27, 2022
Emotets Vacation Is Over: No Rest For...
Emotet started as a banking Trojan in spreading via spam campaigns by imitating financial statements,...
Nov 24, 2022
Aurora: A Rising Stealer Flying Under The...
Aurora is a multipurpose botnet with data collection, information stealer, downloading, and remote access Trojan...
Nov 23, 2022
Analysis Of The ViperSoftX And VenomSoftX Information...
Torrents and software-sharing sites are being used to target victims across the globe with variants...