Threat Database Trojans Troj/Ransom-KM

Troj/Ransom-KM

By JubileeX in Trojans

Threat Scorecard

Ranking: 4,407
Threat Level: 50 % (Medium)
Infected Computers: 18,383
First Seen: November 26, 2012
Last Seen: September 14, 2023
OS(es) Affected: Windows

Troj/Ransom-KM belongs to a large family of ransomware Trojans that display fake messages from the police. Troj/Ransom-KM has been used in a recent wave of attacks involving hacked websites registered with GoDaddy. These attacks use DNS hacking techniques to force computer users to visit malicious IP addresses. There, a well known exploit kit is used to install malware on the victim's computer, eventually leading to the Troj/Ransom-KM infection, which is the main payload of these attacks. ESG security researchers advise protecting yourself from this attack by making sure that your security software has the latest security updates and that you are using it to protect your computer at all times. While safe browsing techniques will protect computer users from most malware attacks, the Troj/Ransom-KM attack involves hacked legitimate websites, meaning that Troj/Ransom-KM will affect these websites' regular visitors. It is important to note that these attacks are not the responsibility of GoDaddy but of the websites' owners. ESG malware researchers suspect that these websites may have been hacked because of a failure of using adequate passwords and security measures to protect these web pages from intruders.

Ransomware trojans are among the most common kinds of malware infections today. These kinds of attacks will typically involve a Winlocker component and a fake message from the police. The Winlocker component in Troj/Ransom-KM blocks access to the victim's files and operating system. Troj/Ransom-KM basically prevents the victim from using Windows services like the Windows Task Manager or the Windows Registry Editor and freezes the victim's screen on a full-screen ransom message. This message will usually take the form of a bogus notification from the police. The language of the victim's location (this information can be derived from the victim's IP address) will be used to write the message, and it will also include logos and insignias and make reference to that location's police agencies. The message will allege that the PC was related to illegal actions (such as downloading illegal pornography or copyright infringement). Then, Troj/Ransom-KM will demand the payment of a fine, usually the equivalent of $200 USD.

Affected computer users can often recover from a Troj/Ransom-KM infection by using alternative boot methods to gain access to their security software. Although Troj/Ransom-KM blocks access to your files and programs, they are still there; it is only necessary to gain access to them by starting up Windows in a different way (for example, using the command line or an external drive). Once this is done, a fully up-to-date anti-malware solution should be capable of removing Troj/Ransom-KM; in fact, manual removal is not difficult and only requires basic knowledge of the Windows Registry.

Trending

Most Viewed

Loading...