Threat Database Ransomware CyberThanos Ransomware

CyberThanos Ransomware

By GoldSparrow in Ransomware

The CyberThanos Ransomware is a newly uncovered file-encrypting Trojan that was spotted in the wild. Threats like the CyberThanos Ransomware are very popular among cyber crooks, as they are not overly complicated to build and are rather easy to distribute.

Propagation and Encryption

The creators of the CyberThanos Ransomware appear to be spreading this threat by concealing it as an illicit activation tool for some iterations of the Windows OS, such as Windows 10 and Windows 7. The data-locking Trojan also may be disguised as an activation utility for the Microsoft Office service. The name of the fake activation tool is KMS. The attackers are likely to use torrent trackers and platforms hosting pirated software to distribute this bogus tool. The goal of the CyberThanos Ransomware is to encrypt all the data it can get its hands on. This means that if the CyberThanos Ransomware infiltrates your computer, it will make sure to lock all your files and render them unusable securely. Most data-locking Trojans encrypt the files on the victim's system and save a decryption key, which is meant to be sold to the user so that they can recover the locked data. However, in the case of the CyberThanos Ransomware, the decryption key is not saved. This means that even if you pay the attackers, you will not be provided with a decryption key, as the key in question is not saved anywhere. This is a sign of a poorly built ransomware threat. The CyberThanos Ransomware appends an additional extension to the names of the affected files – '.encrypted.' For example, the file 'crystal-glass.pdf' will be renamed to 'crystal-glass.pdf.encrypted' once the encryption process has been completed.

The Ransom Note

Files that CyberThanos affects are given the “.encrypted” extension. A document called “doc1.doc,” for example would become “doc1.doc.encrypted” after it had been encrypted. This new naming system applies to all affected files and is one of the reasons that users are unable to access their data.

CyberThanos also creates a text file called “README.txt” on the desktop. The ransomware mostly spreads through pirated software and is disguised as an illegal activation tool/cracker. CyberThanos proliferates primarily through Microsoft products such as Windows OS and Office.

The CyberThanos Ransomware would drop the attackers' ransom message on the user's computer in the shape of a text file called 'README.txt.' The note reads:

(SensorsTechForum)
This is a punishment on you !!!
Thief don't respect developers !!!
Since you don't like repecting copyright,
You should receive a little punishment.

The text in the note says that the encryption was a punishment for the user disrespecting software developers and copyright laws. This would appear to be a reference to how CyberThanos proliferates through software activation tools. It’s unknown if the person behind the ransomware genuinely believes in the message or not. It is possible that the note is entirely fictitious, and the creator is just testing their virus for no particular reason.

Ransomware viruses stand out for their ransom demands. They almost always demand an amount of money in return for the decryption key or tool. CyberThanos, on the other hand, offers no such ransom or way to contact the developer. This lack of communication makes it nearly impossible to recover data because the ransomware can’t be undone without help from the developer. The only way to safely remove CyberThanos and restore lost data would be through the use of a data backup.

How Does CyberThanos Infect Computers?

CyberThanos primarily spreads through software “cracking” tools for Microsoft products. Illegal activation tools aren’t the only way that malware spreads, however. Malware spreads through Trojans, fake software updaters, spam email campaigns, and untrustworthy download websites.

Trojan viruses are a kind of program that can create chain infections by installing other malware. Spam campaigns involve sending out hundreds of emails with malicious links or malicious attachments. While most people ignore these messages, a handful of people will interact with them and infect their computers.

Malicious updates infect computers by installing viruses and malware instead of the actual software update. Untrusted download sources, such as P2P file-sharing networks and freeware sites, offer malware hidden inside seemingly-innocent products.

How to Protect Against Ransomware Infections

There are several things you can do to protect your computer against malware infection. The most important thing to do is to avoid illegal downloads and software cracks. Make sure that you download programs through official channels and trusted third-party sites to prevent malicious downloads. Be sure to keep software and your computer operating system up to date as well as most viruses target vulnerabilities in outdated programs.

It is good to exercise caution when reading emails, especially emails with attachments and links. Always double-check the information even if the email appears to be from a legitimate source. Scam emails are often written in the name of a legitimate company, such as a shipping notice that says you missed a delivery.

Of course, the most important thing to do for your computer is to install a robust antivirus program. A good antivirus program detects and removes infections before they can do any severe damage. Keep CyberThanos at bay with these security tips.

Trending

Most Viewed

Loading...