Legal help for data breach compensation claims

GoldenEye malware – the “new ransomware” security threat!

Start Your Claim Today!

Your privacy is extremely important to us. Read how we handle your data in our Privacy Policy

Malware and ransomware has been on a sharp rise in recent years, with security researchers saying that cyberthieves are adopting them in “alarming” numbers.

The rise in these types of cyber-attacks are usually money driven.

Malware is a software that’s installed covertly onto the user’s computers and disrupts the system to allows the cyber-hacker unauthorised access to it.

There’s a ‘new’ malware on the horizon… and it’s not from an unknown territory.

The Petya and Mischa ransomware combo effectively works together to encrypt user data, and they’ve joined forces to create a new malware called the GoldenEye. The GoldenEye ransomware is commonly mistaken for a new type of ransomware, when in actual fact, many experts believe that it’s a rebranding of the Petya and Mischa malware.

How does the GoldenEye malware work?

As of 6th December, computer users reported malicious attacks, and after it was brought to the attention of security experts, the GoldenEye ransomware was identified as almost identical to Petya and Mischa.

The GoldenEye ransomware is spread through spam emails, and seems to only be targeting German-speaking users at this point. The spam emails are sent from individuals pretending to express their interest for a position at the company, containing two file attachments. The first is a CV that is used to convince the recruiter that the email is what it purports to be and is legitimate. The second is the killer; an excel spreadsheet. The spreadsheet is the main installer for the GoldenEye malware and contains malicious software that installs the malware.

It isn’t installed automatically, and the user has to click on the Enable Content button. Once the software is downloaded, it can automatically launch the programme and begin the encryption process. By this point, there is little the user can do to save their information and data. When the ‘encryption operation’ has ended, the ransomware will show the following note: “YOUR_FILES_ARE_ENCRYPTED.TXT”. Once information is encrypted, the user can only retrieve their data on payment.

This is where ransomware comes in. The cyber-hackers will only restore the users’ system back to its original form once a sum of money is paid.

How to recover your files

Users who want to recover their files can’t do so without a “personal decryption code”, which can only be purchased on the darknet. The GoldenEye malware asks for around £800 (which is usually paid in Bitcoins, a digital currency).

If you have been affected by the GoldenEye malware you can find step-by-step instructions online by searching for “goldeneye malware instructions”.


Because of the clever nature of the emails, some may not question the legitimacy of them. Even the most cautious individuals would’ve opened an email or an attachment which thankfully didn’t lead to malware, but on retrospect maybe wondered what made us trust the email. Unfortunately, this is how malware and ransomware works. It gains trust through deception.

How to keep protected

The best way to keep yourself protected from a malware attack is to download and install the anti-malware tool which provides a solution for your computer and checks for any malicious software. The scan will provide a list of items that may harm your computer system. With ransomware, it gets trickier, as the email usually looks legitimate. My advice is to boost your anti-spam settings, this’ll filter out any potentially harmful messages.

Of course, these small tips aren’t a complete solution but it’ll most certainly enhance the security of your system.

IMPORTANT: advice on this page is intended to be up-to-date for the 'first published date'.

Request a call back from our team

Fill out our quick call back form below and we'll contact you when you're ready to talk to us.
All fields marked with an * are required.

Your privacy is extremely important to us. Information on how we handle your data is in our Privacy Policy.
You have the right to object to the processing of your personal data.

First published by Author on February 07, 2017
Posted in the following categories: Malware and tagged with

Rise of the fake news and its implications from a data perspective
Police involved after a sensitive data leak occurred at Isle of Man’s Department of Health and Social Care