Chaos Ransomware Targets Gamer through Fake Minecraft alt lists

The Chaos Ransomware group encrypts gamers’ Windows devices through fake Minecraft alt lists advertised on gaming forums. Minecraft is a massively well-known sandbox video game presently played by over 140 million people, and according to Nintendo sales numbers, it is a top-seller title in Japan.

Concealed as an ‘Alt list’ text file

According to security investigators, a currently discovered variant of the Chaos ransomware is being conditionally distributed in Japan, encoding the files of Minecraft players and dropping ransom notes.

The appeal utilized by the threat actors are ‘alt list’ text files that apparently contain hijack Minecraft account passwords, but in reality, is Chaos ransomware executable. Minecraft players who want to troll or grief other players without any risk of their accounts being banned will sometimes use ‘alt’ lists to find hijack accounts that they can use for bannable offenses.

Due to their popularity, alt lists are always in demand and are commonly shared for free or through automated account generators that supply the community with “spare” accounts.

Chaos-Ransomware-Targets-Gamer-through-Fake-Minecraft-alt-lists-image-1

The Chaos Ransomware

When encrypting victims, the Chaos ransomware will append four random characters or digits as the extension to encrypted files. The ransomware will also drop a ransom note named ‘ReadMe.txt,’ where the threat actors demand 2,000 yen (~$17.56) in pre-paid cards.

Chaos-Ransomware-Targets-Gamer-through-Fake-Minecraft-alt-lists-image2

A destructive infection

This particular variant of the Chaos Ransomware is configured to search the infected systems for different file types smaller than 2ΜΒ and encrypts them. However, if the file is larger than 2MB is will inject random bytes into the files, making them unrecoverable even if a ransom is paid.

Due to the destructive nature of the attack, those who pay the ransom can only recover smaller files.

The reason for this functionality is unclear, and it could be caused by poor coding, incorrect configuration, or damaging gamers’ files purposely. In this particular campaign, the threat actors are promoting text files to create a false sense of security while swapping them out in the end with executables.

Users should be suspicious of and not execute any files they download from the Internet unless they trust the site and have scanned it with a tool like VirusTotal.

Leave a Reply