Threat Database Ransomware MALARIA VIRUS Ransomware

MALARIA VIRUS Ransomware

Cybersecurity experts have identified a new ransomware called the MALARIA VIRUS during their investigation into potentially threatening software. Once the MALARIA VIRUS infects a targeted device successfully, it initiates a process where it encrypts the data found on the device. Each encrypted file is renamed with an appended extension consisting of four random characters. For instance, a file named '1.png' might be transformed into '1.png.pl5s' or '2.pdf' into '2.pdf.mlv1', and so forth for all affected files.

Upon completing the encryption process, the MALARIA VIRUS alters the system's desktop wallpaper and places a ransom note named 'INSTRUCTIONS.txt.' Researchers have identified the MALARIA VIRUS as a variant based on the Chaos Ransomware family.

The MALARIA VIRUS Ransomware Renders Victims' Data Unusable

The ransom note left by MALARIA VIRUS notifies victims that their files have been encrypted and claims that all their devices have been infected, with sensitive data extracted from them. The note demands a payment of $149.99 in the Monero (XMR) cryptocurrency for the decryption software. Essentially, the attackers are extorting the victims by holding their data hostage.

Additionally, the ransom amount is specified as 1.235 XMR, with an approximate conversion rate of ~$150 (noting that cryptocurrency values fluctuate).

Victims are given a deadline of twenty-four hours to comply. Failure to pay means not only losing access to the encrypted data but also facing the threat of the stolen files and information (such as photos, videos, search history, notes, etc.) being leaked to the victim's contacts.

In most cases of ransomware infections, decrypting files without the attackers' assistance is usually impossible, except in instances where the malware has significant flaws.

Moreover, victims often do not receive the promised decryption tools even after paying the ransom. Therefore, it is strongly advised against meeting the demands of cybercriminals, as there is no guarantee of file recovery. It is important to understand that sending money to criminals supports illegal activities.

While removing the the MALARIA VIRUS ransomware from the operating system can prevent further encryption, it will not restore files that have already been compromised.

Implement Sufficient Security Measures against Malware and Ransomware Threats

To protect against malware and ransomware threats, users should implement several security measures on their devices. These measures are essential for safeguarding personal and sensitive information. Here's a comprehensive list of security practices:

  • Use Reliable Anti-Malware Software: Install reputable anti-malware software on your devices. Always make sure to keep the software updated to detect and remove the latest threats.
  • Enable Firewall Protection: Activate the firewall on all devices to monitor their network and Internet traffic. Firewalls can prevent unauthorized access and block unsafe connections.
  • Keep Operating Systems and Software Updated: Update operating systems and software to be sure that they have the latest security patches and updates. After all, vulnerabilities in outdated software can be exploited by malware.
  • Exercise Caution with Email Attachments and Links: It is best to be cautious when interacting with attachments or clicking on links from unknown or suspicious senders. Always verify the authenticity of the sender before interacting with email content.
  • Avoid Questionable Websites: Refrain from visiting untrusted or suspicious websites, especially those that prompt you to download software or enter personal information.
  • Use Secure and Unique Passwords: Create secure and exclusive passwords for your accounts and avoid using the same password across multiple platforms. Consider the convenience of using a reputable password manager to store and manage passwords securely.
  • Enable Two-Factor Authentication (2FA): Implement two-factor authentication where possible. This will maximize your security because it will ask for a second form of verification in addition to your password.
  • Regularly Back Up Important Data: Keep regular backups of your important files and data on an external hard drive or cloud storage service. In case of a ransomware attack, you can restore your files from backups without paying the ransom.
  • Educate Yourself About Phishing Attacks: Learn to recognize phishing attempts and educate others within your household or organization. Be wary of unexpected messages requesting sensitive information or urgent actions.
  • Limit User Privileges: Restrict user privileges on devices to minimize the impact of malware if it manages to infiltrate your system. Use standard user accounts for everyday tasks and reserve administrative privileges for system updates and installations.

By setting up these security measures, users can significantly diminish the risk of falling victim to malware and ransomware attacks, ensuring their devices' and personal data's safety and integrity.

The full text of the ransom note left to the victims of the MALARIA VIRUS Ransomware is:

'THE MALARIA VIRUS™

YOU HAVE BEEN HACKED

All of your files are now encrypted…

Your computer was infected with a ransomware virus.
Your files are now encrypted and you will not be able to access them without our help.

What can I do to get my files back?

You can order our decryption software, which will allow you to recover all of your data and remove the ransomware from your computer. The price for the software is $149.99. Payment is made EXCLUSIVELY through a cryptocurrency called MONERO (XMR).

BEFORE WE CONTINUE

Just a quick disclamer…

It ain't just your personal computer that we currently have access to. Far from that. We have remote access to EVERY device on your home network, together with data on such devices.

Failure to make a successful transaction will result in all of your personal information (photos, videos, search history, notes etc.) being published to the people from your contacts list. It would be a pretty unpleasant scenario, but it can easily be avoided.

Deleting them won't help you, as they are already backed up on our servers, in case you believe you can outsmart us.
No guide, expert, google search or an authority will help you resolve this, only a quick transaction (more on it later on).

If you still believe we are bluffing, test your luck.

You have 24 HOURS to complete the transaction…

How do I Pay?

Purchasing Monero is not difficult, the best you can do is a quick google search on how to acquire some.

These sites are said to be the easiest to understand and most reliable:

hxxps://www.coinbureau.com/guides/how-to-use-monero/
hxxps://www.getmonero.org/resources/user-guides/make-payment.html

You can send the specified amount to any of these 5 addresses:

1.84LaGDZBun7Eh5byzGjAm49qHexyTR8k2ZxMKMdujW17C qMQFeuB3NTzJ2X28tfRmWaPyPQgvoHVDYmN4q2cPtP85CPjo6r

2.82hFADnc17CqMQFeuB3NTzJ2X28tfRmWaPyPQgvoHVzb 7vL8Kb8rmmnUw6eQYyNeZw6yp5fAKTiLCFrHvXNewSC9363xXzn

3.84KvQhitPgx9tBwV9TZKgEWhQxpLFeE4keh7CncPCWZiN TvGRkpApGmB7rzQztmJ7caad8oWLbkzTaMpv6v2QWLfT3ZhLwu

4.85GUskKaCUNCmpgVqFGarwXPAD5jN6kbGY7NPWtPAU v25YcBrv5fQk17CqMQFeuB3NTzJ2X28tfRmWaPyPQgvoHVLeWEYhZ

5.8ARUSgkNHuRDvjJfygpNMX6WoLgERac9rS9i8CsXs17C qMQFeuB3NTzJ2X28tfRmWaPyPQgvoHViDcQuzvLYinpfHGdEEi4

Payment amount: 1.235 XMR (Adjust it to the current value, it should
be $150)

MAKE SURE TO LEAVE YOUR E-MAIL IN THE DESCRIPTION WHEN SENDING FUNDS!

Otherwise we won't know who to send the software to.

THE MALARIA VIRUS™'

Trending

Most Viewed

Loading...