June 5, 2019 By Shane Schick 2 min read

Security researchers spotted a campaign involving Maze ransomware that bases the cost of recovering stolen data on the type of device its victim is using.

First spotted by a researcher from Malwarebytes and described in detail on Bleeping Computer, the campaign attempts to lure potential victims by posing as an online cryptocurrency exchange service called Abra. The attackers are reportedly purchasing traffic from ad networks to increase their chances of being found, and those who visit the website are hit with the Fallout exploit kit after being redirected to a landing page. Maze ransomware then encrypts files and changes extensions after scanning through the device.

Attackers Adjust Ransom Demand According to Device Type

Although cyberattackers traditionally don’t discriminate as far as the types of machines they infect, the Maze operators tweaked the ransomware to learn more details about its victims. A personal computer used at home, for instance, might be less valuable than a workstation or server run by a large organization.

The attacker’s message appears on the victim’s desktop, states that the files on the machine have been encrypted and prompts the user to purchase a decryptor to recover the compromised data. According to screenshots published by Bleeping Computer, the notes include references to the type of device the victim is using — for example, “We know that this computer is a home computer So [sic] we will give you appropriate price for recovering.” The ransom note is saved as DECRYPT-FILES.html with an email address that ends with the .africa domain.

The ransomware tries to connect with 15 sites whose IP addresses begin with a “92,” though it’s unclear why. The encryption approach is based on the ChaCha keys and RSA. To recover their files, victims are prompted to use a private decryption key to send details such as their name, Windows version and computer ID to the attackers.

Don’t Give in to Maze Ransomware

No matter what kind of computer you have, your first instinct in the event of a Maze ransomware attack might be to simply pay up. However, security professionals caution against giving in to attackers’ demands and instead recommend establishing a solid backup strategy to isolate the compromised machine and secure other parts of the network from unnecessary risks.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today