Threat Database Ransomware Anonymous (Xorist) Ransomware

Anonymous (Xorist) Ransomware

Cybercriminals are constantly developing more sophisticated malware threats, with ransomware remaining one of the most destructive threats. Once it invades a system, it encrypts the targeted files, rendering them inaccessible until a ransom is paid. Unfortunately, even if victims comply with the attackers' demands, there is no guarantee that their data will be restored. Protecting your devices from such attacks is crucial, as prevention is often the only way to avoid irreversible data loss. One particularly insidious ransomware variant that has recently gained attention is the Anonymous (Xorist) Ransomware.

Understanding the Anonymous (Xorist) Ransomware

The Anonymous Ransomware is a threatening strain belonging to the Xorist family. It is known for encrypting files and demanding payments for their decryption. Once it infiltrates a system, it targets files and appends the '. LO0KC1ZHDFI' extension to their names. For example, a file named 'document.pdf' will be renamed 'document.pdf.LO0KC1ZHDFI.'

Following encryption, the ransomware generates ransom demands in a text file named 'HOW TO DECRYPT FILES.txt' and a pop-up window. The note demands a $1500 ransom in Bitcoin for file recovery, offering a discount if victims contact the attackers within four days. Additionally, it warns that attempting to modify the system or files may make decryption impossible.

However, complying with ransom demands is risky. Many victims who pay never receive the promised decryption tools, making the loss permanent. Furthermore, sending money to cybercriminals only encourages future attacks.

How the Anonymous Ransomware Spreads

Like many ransomware variants, the Anonymous (Xorist) relies on various attack vectors to infiltrate systems. These methods often involve phishing, social engineering and software vulnerabilities. Some of the most common infection sources include:

  • Fraudulent Email Attachments & Links – Attackers send deceptive emails with infected attachments (e.g., Word documents, PDFs, or ZIP files) or malicious links that initiate ransomware downloads.
  • Fake Software Updates & Cracks – Users attempting to bypass software licensing with illegal activation tools (cracks) or downloading updates from unofficial sources may unknowingly install ransomware.
  • Drive-by Downloads & Malvertising – Simply visiting a compromised website or clicking on a deceptive ad can lead to an automatic malware download.
  • Trojanized Software & Peer-to-Peer (P2P) Networks – Cybercriminals disguise ransomware as legitimate software on third-party download sites or P2P platforms, tricking users into installing it.
  • Removable Storage & Network Spread – Some ransomware strains can self-replicate across local networks and external storage devices (e.g., USB drives), spreading further within an organization or home environment.

Understanding these attack methods helps users recognize potential threats and take proactive security measures.

Best Security Practices to Defend against Ransomware

Preventing ransomware infections requires a combination of cyber hygiene, proactive security measures, and awareness. Here are essential steps to strengthen your defenses:

  1. Strengthen Your Cyber Hygiene
  2. Backup Your Data Regularly – Maintain offline and cloud-based backups of essential files to ensure recovery in case of an attack.
  3. Use Strong & Unique Passwords—Attackers can exploit weak credentials. Good password managers can generate and store complex passwords.
  4. Enable Multi-Factor Authentication (MFA) – This adds an extra layer of security, making unauthorized access significantly harder.
  5. Secure Your System & Software
  6. Keep Your Operating System & Software Updated – Regular updates patch security vulnerabilities that ransomware exploits.
  7. Use Reputable Security Software – Install anti-malware tools to detect and block malicious activity.
  8. Disable Macros in Office Documents – Many ransomware variants use macros to execute malicious code upon opening infected files.
  9. Be Cautious Online
  10. Avoid Suspicious Emails & Links – Don't open unexpected attachments or click on unknown links, even if they appear to be from trusted sources.
  11. Download Software Only from Official Providers – Avoid third-party download sites, torrents, and illegal software activators.
  12. Be Wary of Online Ads & Pop-Ups – Cybercriminals use malvertising to spread malware through deceptive ads.

By implementing these security best practices, users can be much more secure and avoid falling victim to ransomware attacks like Anonymous (Xorist).

Final Thoughts

The Anonymous (Xorist) Ransomware is a harmful cyber threat that can cause severe data loss and financial harm. Since decrypting files without the attackers' key is usually impossible, prevention is the best defense. By staying vigilant, keeping backups, and following decisive security actions, users can protect their systems and data from ransomware attacks. Cybersecurity awareness and proactive protection are essential in today's digital world—don't wait until it's too late to secure your devices!

Messages

The following messages associated with Anonymous (Xorist) Ransomware were found:

Device ID :
The device files have been encrypted at the moment and it is impossible to access them at the moment except when you pay the amount of 1500 $ in BTC by currency you have 4 days to get a discount
Communication ways :-
Phone Application ICQ :747201461
Email : kil4tx@secmail.pro
WALLET BTC : 12et3ym4PnDzc9L5AfXyJz7bTfb8zvc8Hn
Note Do not tamper with the files or settings of the device Tip because if tampered with, we will not be able to restore your files
All rights reserved : Anonymous ? .

Trending

Most Viewed

Loading...