Lynx Ransomware: The Hidden Predator
The Lynx Ransomware was first reported in November 2020 and has been posing a significant threat since. One of the notable victims of this ransomware includes Canadian healthcare service provider ‘LifeLabs’, leading to temporary suspension of its services. In another incident, the Bulgarian National Revenue Agency (NRA) fell prey to this ransomware, resulting in the leakage of data of 5 million citizens. Considering its widespread impact, the threat imposed by Lynx Ransomware is considered high.
Information on Lynx Ransomware
| Category | Details |
|---|---|
| Ransomware Name(s) | Lynx Ransomware |
| First Detected/Reported | November 2020 |
| Targeted Operating Systems | Windows |
| File Extensions Added | .lynx |
| Ransom Note Name(s) | HOW_TO_RESTORE_FILES.txt |
| Distribution Methods | Phishing emails, malicious downloads |
| Detection Names by Antivirus Solutions | Ransom.Lynx |
Example Ransom Note
Hello, Your files have been encrypted by Lynx Ransomware. To recover them, please send 0.1 BTC to the following address: [wallet address] Your files will be decrypted upon payment. Failure to pay within 48 hours will result in permanent data loss.
Additional Information
- There is currently no known decryption tool available for Lynx Ransomware, intensifying its impact.
- The ransomware utilizes complex obfuscation techniques to avoid detection by antivirus software, making it difficult to prevent.
- It is believed to primarily target small to medium businesses – specifically in the healthcare and financial sectors.
- Lynx Ransomware operates as a Ransomware-as-a-Service (RaaS) model.
You are currently viewing a placeholder content from Wistia. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information