Basında Hidden Tear - Published Articles

21 August 2015

 

Zaman Çizelgesi (Timeline)

Phase 1 

Hidden Tear yayınlandı (Hidden Tear is published)

Reddit Discussion Topic

Mcafee Blog - Ransomware a Favorite of Cybercriminals

The Register - Ransomware blueprints published on GitHub in the name of education

Security Affairs - Hidden Tear Ransomware is now open Source and available on GitHub

Sc Magazine - Ransomware goes open source

Avira Blog - Open Source Ransomware Available On GitHub?

The Hacker News  - Script Kiddies can Now Create their Own Ransomware using This Kit

Myce - Turkish security expert posts fully functional ransomware on Github

TechWorm - Now anybody can create Ransomware using open source kit on GitHub

Under News - Hidden Tear : Un ransomware open source sur Github ?

Webwizard - Open Source Ransomware

Webwereld - Open source ransomware vrijelijk beschikbaar op GitHub

Wallstreet Online - Erste quelloffene Ransomware veröffentlicht

Numerama - Un Ransomware open-source, pour la recherche bien sûr

SecurityDaily -  Ransomware mã nguồn mở được phát hành với mục đích “giáo dục

SecurityLab - Хакер разместил на GitHub вымогательское ПО с открытым исходным кодом

Computerwelt - Erste quelloffene Ransomware veröffentlicht

Redes Zone - Hidden Tear, el primer ransomware de código abierto con fines educativos

Dotcom Security - Hidden-tear: Ransomware ähnliches Script, das zur mächtigen Waffe werden kann

Hack Players - Hidden Tear, nace el primer ransomware de código abierto

Seguridad - Primer ransomware de código abierto

Nacional De Tecnologias De La Informacion Y Comunicacion -  Hidden Tear, el primer ransomware de código abierto con fines educativos

Digitoday - "Virustutkat eivät havaitse" – kiristysohjelmasta tuli avointa koodia

Phase 2

Eda2 yayınlandı (Eda2 is published)

Utku Sen Blog -  eda2 a new era of open source ransomware

Phase 3

FAKBEN Team Hidden Tear kodunu kullandı (FAKBEN Team used Hidden Tear's code)

Fortinet Blog - FAKBEN Team Ransomware Uses Open Source “Hidden Tear” Code

Phase 4

Hidden Tear'ın içine bilerek backdoor koyduğumu, bunun bir honeypot projesi olduğunu ve içindeki encryption algoritmasının nasıl aşılacağını açıkladım. Böylece Hidden Tear kodlarından oluşturulan Linux Encoder virüsü bertaraf edildi. (I revelaed the backdoor inside Hidden Tear, told it was a honeypot project and explained how to destroy it's encryption algorithm. Linux Encoder malware which is using Hidden Tear's code also destroyed)

Utku Sen Blog - Destroying The Encryption of Hidden Tear Ransomware

Reddit Discussion Topic

Hacker News Discussion Topic

Phase 5

Trendmicro firması Brezilyalı bir hacker grubunun Hidden Tear kodlarını kullanarak Cryptear.B isminde bir ransomware ürettiğini ancak grubun yaptığı bir hatadan dolayı dosyaları kurtarmanın imkansız olduğunu açıkladı (Trendmicro found a hacker group from Brasil who are using Hidden Tear's code to build Cryptear.B ransomware. But Trendmicro claimed that file recovery is impossible because of bad implementation)

Trendmicro Blog - A Case of Too Much Information: Ransomware Code Shared Publicly for “Educational Purposes”, Used Maliciously Anyway

Softpedia - Shoddy Ransomware Destroys User's Files

Securityaffairs - Flawed RANSOM_CRYPTEAR ransomware makes impossible the file recovery

Pcworld - Faulty ransomware renders files unrecoverable, even by the attacker

Securityweek - Educational Ransomware Abused by Cybercriminals

Betanews - Sharing ransomware code for educational purposes is asking for trouble

Internetcom - 悪用するなよ、絶対悪用するなよ―教育目的の「オープンソース」ウイルス、やっぱり悪用

Phase 6

Brezilyalı grubun ürettiği Cryptear.B'nin içindeki backdoor'u kullanarak dosyaların nasıl kurtarılabileceğini bir makale yazarak açıkladım (I explained how to recover files with backdoor which is  inside Cryptear.B in an article)

Utku Sen Blog - Dealing With Script Kiddies – Cryptear.B Incident

Reddit Discussion Topic

Securityweek - Encryption Flaw Used to Crack Cryptear Ransomware

Phase 7

Rus bir hacker grubu Eda2 kodlarını kullanarak "Magic Ransomware" isimli bir virüsü yaymaya başladı. (A Russian hacker group used Eda2's code to spread "Magic Ransomware" malware)

Forbes - Ransomware: Coming To A Business Near You

Securityweek - New "Magic" Ransomware Based on Open-Source Code

Bleepingcomputer - New Magic Ransomware developed from open source EDA2 Ransomware

Scmaganize - New Magic ransomware abuses open-source 'educational' code

Phase 8

Magic Ransomware programının verdiği zararı geri döndüremeyip kamuoyundan özür dileyerek kodları yayından kaldırdım. (I failed to recover files which are effected by Magic ransomware. I publicly apologized and removed Eda2 codes from my github account)

Utku Sen Blog - Project Eda2 is Abandoned Due to Magic Ransomware Incident

Phase 9 

Başarısız olduğumu fark eden Rus grup tüm projelerimi yayından kaldırmam için şantaj yapmaya başladı (The Russian group has started to blacmail me after my failure)

Softpedia - Ransomware Author Blackmails Security Researcher Who Refuses to Give In

Securityweek - Malware Developers Blackmail Creator of Open-Source Ransomware

Grahamcluley - Ransomware author tries to blackmail security researcher into taking down 'educational' malware project

Bleepingcomputer - Hidden Tear Ransomware Developer Blackmailed by Malware Developers using his Code

Xakep - РУССКОЯЗЫЧНЫЕ ХАКЕРЫ ШАНТАЖИРУЮТ АВТОРА OPEN SOURCE МАЛВАРИ HIDDEN TEAR И EDA2

Phase 10

Rus grupla anlaşarak projelerimi yayından kaldırdım (I negotiated with Russian group and destroyed my projects)

Business Insider - A security researcher created a dangerous virus for fun — and then chaos broke loose

Slashdot - Malware Operator Barters With Security Researcher To Remove Open Source Ransomware Code

Phase 11

Hidden Tear'ın kodlarından evrimleşen, OS X sistemleri hedef alan KeRanger isminde bir ransomware çeşidi ortaya çıktı ( KeRanger OS X ransomware which is developed from Hidden Tear's code appeared in wild)

Softpedia - KeRanger Ransomware Is Actually Linux.Encoder Ported for Macs

Phase 12

Polonyalı bir hacker Eda2 kodlarını kullanarak yeni bir ransomware üretti, kodun içindeki backdoor sayesinde bu tehdit savuşturuldu (a polish hacker developed a new ransomware based on eda2's code defeated by security researchers by using it's backdoor)

Softpedia - Braggadocio Ransomware Developer Gets Humbled by Security Researchers

Securityaffairs - EDA2, derived from the educational ransomware, is easy to break

Securityweek - New EDA2-Based Ransomware Easily Neutralized

The Register - Blundering ransomware uses backdoored crypto, unlock keys spewed

Grahamcluley - Ransomware author's bravado shot down by release of decryption keys

Zdnet - Ransomware über Hintertür in der Verschlüsselung ausgetrickst