Adage Ransomware

Adage Ransomware Description

Adage Ransomware Ransomware ScreenshotAdage Ransomware is a recent form of cryptovirus capable of locking target users out of their PC systems. To do so, Adage performs all-out encryption of the victims' data appending the '.adage' extension to each affected file. In terms of its architecture, Adage bears a striking resemblance to Phobos Ransomware, leading researchers to consider Adage to be an offshoot of Phobos Ransomware.

Infection Vectors

Similar to Phobos, Adage Ransomware is most likely to arrive embedded in spam email campaigns, usually in the form of malicious attachments or web links. That is why Adage can be particularly dangerous to credulous users who tend to open every email they receive without searching for typical spam symptoms beforehand. The thing is, an attached invoice and another macro-enabled document may often look harmless at first sight, only to do pervasive damage later on after misleading the unsuspecting user into enabling macros to access the text. The same goes for embedded URLs designed to redirect the victim to a malware-laden web page rather than the seemingly genuine destination it pretends to.

When it comes to spreading Adage, hackers can take advantage of social media and file-sharing platforms, too. In this case, the cryptovirus may be lying dormant in web ads, disguised as a useful PC optimization tool, or bundled with other software as a drive-by download.

Regardless of which infection vector Adage ransomware has used to reach your PC system, it always pursues the same goal – to encrypt your data and extort money in exchange for restoring them.

Actual Infection

A close analysis of a recent Adage ransomware sample revealed how the parasite works once it has landed on a PC. Like other ransomware threats, Adage’s payload dropper contains more than one malicious tool because of the sheer amount of operations it has to perform before executing successful encryption. In brief, Adage ransomware is responsible for:

  • Neutralizing any installed AV solutions
  • Modifying your start menu, web browser settings, and file names
  • Tampering with the Windows Registry to gain persistence during system startup

Once all the steps mentioned above have come to an end, Adage proceeds with the actual encryption process. If successful, the latter appends an additional extension to each infected file. This extension consists of two parts – an email address [in brackets] and the '.adage’ supplement. To date, every Adage infection we have witnessed so far features one of the following two extensions:

  • [wewillhelpyou@qq.com].adage
  • [helpteam38@protonmail.com].adage

Given that Adage Ransomware is still active at the time of this writing, future infections may feature a different email address as an extension. The '.adage’ component, on the other hand, would be highly unlikely to go away.

The Ransom Note

Following full-blown file encryption, Adage ransomware generates the ransom note outlining the terms and conditions for restoring all data. The note accompanying Adage ransomware is quite similar to the one seen in Phobos infections.

Here is the text of the note:

All your files have been encrypted!
All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the email [highlighted box]
Write this ID in the title of your message [highlighted box]
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.
Free decryption as guarantee
Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 10Mb (non archived), and files should not contain valuable Information. (databases,backups, large excel sheets, etc.)
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.comiinformation/how-can-i-buy-bitcoins/
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

The ransom note arrives in duplicate – as a pop-up Info.hta and in the form of an Info.txt file. The actual ransom amount is missing in the note. Instead, it is subject to further correspondence between the victim and the cybercriminal(s).

Aftermath and Precautions

A successful ransomware attack might as well render your files inaccessible to you. You could try to restore them via Microsoft Windows' Volume Shadow Copy Service (VSS) to retrieve backup copies or file snapshots. Unfortunately, that would only work if the Adage Ransomware virus has not already deleted those Shadow Volume Copies. Using a third-party anti-malware tool may help you remove Adage's malicious files from your system, but it won't decrypt your data if the disaster has already struck. Unless researchers have developed and shared a free decryption tool on the Web, you may decide on paying the crooks for a promised decryptor as a last resort. However, we advise against you doing so because the prospect of the cybercriminals honoring their promise to give you a working decryption tool is inconsistent with the empirical evidence amassed so far.

In light of the grim consequences surrounding an Adage ransomware infection, it is crucially important to perform regular data backups as the ultimate preventive measure. More often than not, this is the only action that may avoid any data loss. On the other hand, running a reputable anti-malware solution on your system is just as paramount as it will provide you with real-time protection against such nasty threats.

Do You Suspect Your PC May Be Infected with Adage Ransomware & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Adage Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Related Posts

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.