A new ransomware name [F]Unicorn has been spreading in Italy by tricking its victim into downloading a fake contact tracing app. They have done it using by taking advantage of the Italian Pharmacist Federation (FOFI) to look like it came from a trusted and reliable source.
Users are lured with an email in Italian informing that a beta release of Immuni for PC is available to fight the spread of COVID-19. From the text of the message, the targets are pharmacies, universities, doctors, and other entities fighting the new coronavirus contagion.
The attacker also cloned the FOFI website and registered a domain name similar to the original. However, they used “fofl.it,“ with a lowercase ”L“ as the last character that is easily confused with the lowercase ‘i’ used in the legitimate domain name.
So when you download and execute the malicious apps, it will shows a fake dashboard from Center for Systems Science and Engineering at Johns Hopkins University. The malware then looks for the following file types in your system.
So once your system is encrypted, the cyber criminals will ask you to pay
EUR 300 in three days and to be paid in
BTC.
Scammers bitcoin address:
195naAM74WpLtGHsKp9azSsXWmBCaDscxJ
https://www.blockchain.com/btc/address/195naAM74WpLtGHsKp9azSsXWmBCaDscxJIt's good that no one has deposited in that address so far.
Scammers email address:
Base on the report, usually this malware targets those who are in the front line of the fights against the virus, but I'm sure they can modify the code to target everyone by having an email campaign.
https://www.bleepingcomputer.com/news/security/new-f-unicorn-ransomware-hits-italy-via-fake-covid-19-infection-map/