{"id":21804,"date":"2022-05-02T19:25:05","date_gmt":"2022-05-02T19:25:05","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21804"},"modified":"2022-05-02T21:28:23","modified_gmt":"2022-05-02T21:28:23","slug":"onyx-ransomware-destroys-files","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/","title":{"rendered":"Onyx Ransomware Destroys Large Files Instead of Locking Them"},"content":{"rendered":"<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">Ransomware<\/a> just keeps getting worse, it seems. Cybersecurity researchers last week revealed that a new ransomware gang called Onyx is simply destroying larger files rather than encrypting them.<\/p>\n<p>As the MalwareHunterTeam noted in a <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1517150915475779584\" target=\"_blank\" rel=\"noopener\">Twitter thread<\/a>, &#8220;as the ransomware they are using is a trash skidware, it&#8217;s destroying a part of the victims&#8217; files.&#8221;<\/p>\n<p>The team would recommend that &#8220;no company should pay to these idiots &#8230; but they are stealing files too.&#8221;<\/p>\n<p>Most threat actors have been focused on locking data, sometimes with innovative techniques to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">evade detection tools<\/a>. The idea is to force the victims to pay the ransom in return for the stolen data.<\/p>\n<p>The Onyx ransomware group doesn&#8217;t bother with encryption. Any file larger than 2MB, which is pretty common in enterprises, is simply destroyed. Unlike with other ransomware strains, you can\u2019t recover documents with a decryption key.<\/p>\n<p>Such a low size limit will include most files on the victims&#8217; computers. Besides, if the motive is money, as you would expect from a ransomware group, then the approach seems questionable. Why would companies pay a ransom if they know they won\u2019t be able to recover most files?<\/p>\n<p>Coming the same week that the REvil ransomware group <a href=\"https:\/\/twitter.com\/JakubKroustek\/status\/1520135975262957568\" target=\"_blank\" rel=\"noopener\">apparently returned<\/a>, these are tough times for cybersecurity pros.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\n<h2><strong>Analyst: Don&#8217;t Pay Onyx Ransom<\/strong><\/h2>\n<p>MalwareHunterTeam posted a code sample on Twitter:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21806\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/code.png\" alt=\"Onyx ransomware code\" width=\"749\" height=\"347\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png 749w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code-300x139.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code-150x69.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code-696x322.png 696w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The hackers use the above .NET code to overwrite any file bigger than 2MB with junk data. Only small files lower than 2MB are encrypted. The rest of the files are overwritten with random trashed data, so there\u2019s no way to decrypt them after.<\/p>\n<p>It was a bit unclear whether this behavior was the initial plan or the result of a bug in the implementation, but Ji\u0159\u00ed Vinopal, Forensic and Malware Analyst, Reverse Engineer at CERT, <a href=\"https:\/\/twitter.com\/vinopaljiri\/status\/1519660836599603200\" target=\"_blank\" rel=\"noopener\">tweeted<\/a> that the Onyx ransomware is likely based on the Chaos ransomware builder that systematically overwrites big files:<\/p>\n<p style=\"padding-left: 40px;\">&#8220;One note added by @malwrhunterteam and already confirmed that it works like this:<\/p>\n<p style=\"padding-left: 40px;\">1 &#8211; for small files.<\/p>\n<p style=\"padding-left: 40px;\">2 &#8211; for big files.<\/p>\n<p style=\"padding-left: 40px;\">3 &#8211; for between the two. In encrypt mode, small files encrypted, others overwritten. In overwrite mode, small files not touched-skipped, others overwritten.&#8221;<\/p>\n<p>Therefore, it\u2019s safe to assume it was intentional and the victims should not pay the ransom, as it won\u2019t solve the problem and the extortion might even continue after payment.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\">Best Ransomware Removal Tools<\/a><\/p>\n<h2><strong>Similar to Conti Ransom Note<\/strong><\/h2>\n<p>Two years ago, the Conti ransomware group disclosed stolen data even if the victims paid the ransom.<\/p>\n<p>MalwareHunterTeam noticed the instructions left by Onyx for their victims are \u201cmostly a copy-paste of Conti&#8217;s note,\u201d sharing the following example:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21807\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/onyx-note1.png\" alt=\"onyx ransomware note\" width=\"1347\" height=\"440\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1.png 1347w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1-300x98.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1-1024x334.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1-768x251.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1-150x49.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1-696x227.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note1-1068x349.png 1068w\" sizes=\"(max-width: 1347px) 100vw, 1347px\" \/><\/p>\n<p>The hackers offer to decrypt \u201ctwo random files completely free of charge\u201d to prove they \u201creally can get the data back.\u201d But unless you\u2019re doing some hunting and know what you\u2019re doing, don\u2019t visit their website with Tor and don\u2019t connect with the credentials they provide in the note. Otherwise, you might wind up with additional problems.<\/p>\n<p>The hackers describe their new strain as a \u201cmilitary-grade algorithm\u201d to impress their victims, but that\u2019s clearly not the case.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21808\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/onyx-note2.png\" alt=\"\" width=\"719\" height=\"176\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note2.png 719w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note2-300x73.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note2-150x37.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/onyx-note2-696x170.png 696w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><\/p>\n<p>However, MalwareHunterTeam found six other organizations pwned by Onyx on their onion website (section \u201cOnyx news\u201d), so despite the impossibility of data recovery, you should take the threat seriously.<\/p>\n<p>So far, the Onyx strategy remains unclear, and it&#8217;s possible that this destructive program is the only weapon the ransomware group has for now.<\/p>\n<p>The MalwareHunterTeam found that the hackers not only encrypt and destroy files, but they also steal data to threaten their victims with potential public disclosure. This tactic is not really surprising, as such \u201cdouble threats\u201d are now pretty common in ransomware attacks.<\/p>\n<p>Indeed, in case the ransomware fails to encrypt and lock data (or, in this case, destroy it) the attackers nonetheless can still threaten their target to get paid. The victims should expect some data leaks.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\">How to Recover From a Ransomware Attack<\/a><\/p>\n<h2><strong>How to Protect Against Destructive Ransomware<\/strong><\/h2>\n<p>While it\u2019s pretty hard to determine all of the group\u2019s motives, their destructive approach could disrupt the threat landscape in 2022.<\/p>\n<p>While most victims of ransomware attacks never recover their data even when there\u2019s a so-called \u201cdecryptor\u201d in exchange for money, this attack could be the beginning of a new paradigm where using decryption keys as leverage does not make sense anymore for threat actors.<\/p>\n<p>Ransomware removals and security tools make ransomware attacks ever more difficult to achieve, which might explain, at least partly, why they prefer destroying files. Besides, it can be used to threaten companies with further attacks, so if they don\u2019t pay the ransom, they\u2019ll certainly lose more data &#8211; and have it publicly exposed.<\/p>\n<p>The only way to mitigate such devastating attacks is to prepare for post-exploitation techniques and lateral movements. This would require classic security hygiene and <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">awareness<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint monitoring<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">network segmentation<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a> and regular backups, but only as a start.<\/p>\n<p>Companies should prepare for ransomware attacks with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tape-wont-work-for-ransomware-protection\/\">efficient backup routines<\/a> that will protect the data from ransomware attacks.<\/p>\n<p>Backups can be corrupted or deleted by the hackers, so you need penetration tests to emulate real attacks and fix any flawed procedure. Versioning and rollbacks are also strongly recommended.<\/p>\n<p>In addition, you might use specific software to distribute backups or use separate cloud accounts for each desktop to contain the destructive malware.<\/p>\n<p>Remember that ransomware is not just for big companies. Many small businesses have filed for bankruptcy after a ransomware attack. Even if the hacker knew the victims could neither pay the ransom nor lose the data, they still attacked without mercy.<\/p>\n<p>CISA has a <a href=\"https:\/\/www.cisa.gov\/stopransomware\" target=\"_blank\" rel=\"noopener\">website<\/a> devoted to fighting ransomware attacks. That&#8217;s a good place to start to assess your situation and prepare your organization for ransomware events.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fe8491911-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fe8491911\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fe8491911\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fe8491911\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fe8491911\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fe8491911\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fe8491911\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware just keeps getting worse, it seems. Cybersecurity researchers last week revealed that a new ransomware gang called Onyx is simply destroying larger files rather than encrypting them. As the MalwareHunterTeam noted in a Twitter thread, &#8220;as the ransomware they are using is a trash skidware, it&#8217;s destroying a part of the victims&#8217; files.&#8221; The [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21806,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-21804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Onyx Ransomware Destroys Large Files Instead of Locking Them | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A new ransomware strain destroys files and threatens to publicly release data, leaving victims nowhere to turn.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Onyx Ransomware Destroys Large Files Instead of Locking Them | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A new ransomware strain destroys files and threatens to publicly release data, leaving victims nowhere to turn.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-02T19:25:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T21:28:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png\" \/>\n\t<meta property=\"og:image:width\" content=\"749\" \/>\n\t<meta property=\"og:image:height\" content=\"347\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Onyx Ransomware Destroys Large Files Instead of Locking Them\",\"datePublished\":\"2022-05-02T19:25:05+00:00\",\"dateModified\":\"2022-05-02T21:28:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\"},\"wordCount\":998,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\",\"name\":\"Onyx Ransomware Destroys Large Files Instead of Locking Them | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png\",\"datePublished\":\"2022-05-02T19:25:05+00:00\",\"dateModified\":\"2022-05-02T21:28:23+00:00\",\"description\":\"A new ransomware strain destroys files and threatens to publicly release data, leaving victims nowhere to turn.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png\",\"width\":749,\"height\":347,\"caption\":\"Onyx ransomware code\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Onyx Ransomware Destroys Large Files Instead of Locking Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Onyx Ransomware Destroys Large Files Instead of Locking Them | eSecurity Planet","description":"A new ransomware strain destroys files and threatens to publicly release data, leaving victims nowhere to turn.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/","og_locale":"en_US","og_type":"article","og_title":"Onyx Ransomware Destroys Large Files Instead of Locking Them | eSecurity Planet","og_description":"A new ransomware strain destroys files and threatens to publicly release data, leaving victims nowhere to turn.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/","og_site_name":"eSecurity Planet","article_published_time":"2022-05-02T19:25:05+00:00","article_modified_time":"2022-05-02T21:28:23+00:00","og_image":[{"width":749,"height":347,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Onyx Ransomware Destroys Large Files Instead of Locking Them","datePublished":"2022-05-02T19:25:05+00:00","dateModified":"2022-05-02T21:28:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/"},"wordCount":998,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png","keywords":["ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/","url":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/","name":"Onyx Ransomware Destroys Large Files Instead of Locking Them | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png","datePublished":"2022-05-02T19:25:05+00:00","dateModified":"2022-05-02T21:28:23+00:00","description":"A new ransomware strain destroys files and threatens to publicly release data, leaving victims nowhere to turn.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/code.png","width":749,"height":347,"caption":"Onyx ransomware code"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/onyx-ransomware-destroys-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Onyx Ransomware Destroys Large Files Instead of Locking Them"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21804"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21804"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21804\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21806"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21804"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21804"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21804"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}