Please create an account to participate in the Slashdot moderation system


Forgot your password?
Encryption Security Privacy Games Technology

Ransomware Asks For High Score Instead of Money ( 36

An anonymous reader quotes a report from Ars Technica: Rensenware" forces players to get a high score in a difficult PC shoot-em-up to decrypt their files. As Malware Hunter Team noted yesterday, users on systems infected with Rensenware are faced with the usual ransomware-style warning that "your precious data like documents, musics, pictures, and some kinda project files" have been "encrypted with highly strong encryption algorithm." The only way to break the encryption lock, according to the warning, is to "score 0.2 billion in LUNATIC level" on TH12 ~ Undefined Fantastic Object. That's easier said than done, as this gameplay video of the "bullet hell" style Japanese shooter shows. As you may have guessed from the specifics here, the Rensenware bug was created more in the spirit of fun than maliciousness. After Rensenware was publicized on Twitter, its creator, who goes by Tvple Eraser on Twitter and often posts in Korean, released an apology for releasing what he admitted was "a kind of highly-fatal malware." The apology is embedded in a Rensenware "forcer" tool that Tvple Eraser has released to manipulate the game's memory directly, getting around the malware's encryption without the need to play the game (assuming you have a copy installed, that is). While the original Rensenware source code has been taken down from the creator's Github page, a new "cut" version has taken its place, showing off the original joke without any actually malicious forced encryption.
This discussion has been archived. No new comments can be posted.

Ransomware Asks For High Score Instead of Money

Comments Filter:
  • Someone has likely mirrored the original code. It will likely wind up used in other tools. This person needs to be in jail.
    • Do you also think that if someone designs a new gun he should be in jail? If not I would be glad to know why this is different.

    • Someone has likely mirrored the original code. It will likely wind up used in other tools. This person needs to be in jail.

      Ransomware doesn't occur in a vacuum but rather it's a simple application that uses many different libraries. Anyone with half a brain can make it, so what does it matter if someone mirrors the code?

      I think more effort should be put into protecting data from accidental or malicious destruction by an application rather than trying to force the world to conform any particular set of laws. Seriously, it wouldn't take many changes to prevent this kind of shit from happening.

      • THIS! See this is why i like your comments. you normally dont feed into the bullshit and you have a solid head on your shoulders. Why punish the people pointing out how fucking stupid you are, when you can just learn how to avoid it completely. people with no idea on how the internet works, Im looking at you Billy Gates.... adopt all this new fangled IoT crap thats insecure against viruses(what we will call it) as a sheep skin condom. yet want to jail the people telling them that that condom only protects a

  • by freeze128 ( 544774 ) on Saturday April 08, 2017 @10:25AM (#54197999)
    This sounds like like a recruitment tool for the Star League to defend The Frontier against Xur and the Kodan armada.
    • Just a note on this post:

      I re-watched that film only 6 months ago and besides some weak CGI man does it REALLY hold up. It's nice to see a film that's more than just action scenes, flashy CGI and generally poorly written characters and script.

      If you're thinking of re-watching the movie and concerned it'll be dated trash. Don't, much like WarGames it very very much holds up, recommended.

      • by tlhIngan ( 30335 )

        besides some weak CGI

        You have to remember TLS was (along with Tron) the pioneers of CGI - and that computers in the 80s were kinda weak. That said, they did render TLS on a Cray X-MP, the worlds fastest computer back in 1983 running at a blistering 115MHz with around 16MB of RAM. (Though you could get large storage arrays, even 1GB SSDs). Even then at 250k polygons it still was a challenge for the machine. Plus the technology had to be invented - unlike today where you can go out and download yourself a hi

  • by ArylAkamov ( 4036877 ) on Saturday April 08, 2017 @11:12AM (#54198145)

    This is my kind of high stakes gameplay. Challenge accepted.

  • To get your files back you need to nuke North Korea with less then 500 us troops loss

  • That game name could easily be an error code from Java or maybe C#.
  • How long will it take until manufacturers take security seriously?
    • by HiThere ( 15173 )

      Until the manufacturers bear liability for the problems they enable.

      The problem with that is, unless they also get the benefit of the benefits then enable, then they'll just stop selling things. Whoops! (For some of these manufactures I'd count that a win, e.g. MS, but mine is not the majority opinion.)

      • What if you just made them liable for the problems they enable up to the cost of the OS? If everyone asks for a refund, just processing all the refunds will put them out of business, let alone actually paying them.

    • Re:How long until (Score:4, Insightful)

      by bluescrn ( 2120492 ) on Saturday April 08, 2017 @02:52PM (#54198895)
      Manufacturers are taking it more seriously. But for consumers, it comes with a very high price.

      There's some increasingly secure platforms out there (iOS, UWP, games consoles), where code is signed and runs in a sandboxed environment. But you can't run your own code on them, unless it's been approved, censored, and taxed by a monopolistic App Store.
  • Just pay someone who plays games a lot to reach the score for you. Basement nerds, this is your five minutes of fortune!

"The number of Unix installations has grown to 10, with more expected." -- The Unix Programmer's Manual, 2nd Edition, June, 1972