Threat Database Ransomware Flubo Ransomware

Flubo Ransomware

The Flubo Ransomware is a file-locker Trojan spin-off of Xorist Ransomware, a free Trojan-building kit. Victims experience symptoms that include being unable to open their documents and other media, encountering new extensions on their names and seeing pop-ups with Bitcoin ransom demands. An appropriate backup plan can nullify any damages from the Xorist Ransomware versions, and anti-malware services should remove the Flubo Ransomware appropriately.

A Free Five Hundred Dollar Trojan

Although not nearly as secure as, for comparison, the Scarab Ransomware or the Dharma Ransomware's Ransomware-as-a-Services, Xorist Ransomware has a significant advantage for casual threat actors: it's free. The Flubo Ransomware, another release coming alongside the still-unfinished the Lockedfile Ransomware of the same source, proves that the construction kit model for Trojan campaigning is far from dead positively. Whatever else the new year brings with it, 2021 also includes more encryption attacks.

Because the Flubo Ransomware's family is kit-based, there are few variables in its payload relative to other members, like the 'avastvirusinfo@yandex.com' Ransomware, the Blocked2 Ransomware or the Cryptedx Ransomware. In a compatible Windows environment, its core symptoms and features include:

  • Stopping the user's media files from opening by encrypting them
  • Adding secondary 'flubo' extensions to the non-working files
  • Changing the user's wallpaper (usually to a ransom message or warning)
  • Loading a ransom-themed pop-up alert

The last of these items provides a Bitcoin wallet address, e-mail contact for the attacker's recovery help and a price tag of five hundred USD. As of malware experts' last check, there are no payments in this wallet, which seems specific to this the Flubo Ransomware's campaign.

Paying the ransom remains inadvisable for victims extremely. Because Xorist Ransomware's encryption usually isn't secure, there's a strong chance of recovery via a freely-downloadable decryption application without the attacker's assistance.

Beating Freeware Trojans Right Out of the Gate

The semi-unique vulnerability of Xorist Ransomware to third-party decryption solutions isn't a universal truth among file-locker Trojans, most of whom have more robust encryption security. Malware researchers suggest all users partaking in comprehensive and well-maintained backups as an ideal counter. Users with their files saved to other devices can shrug off any temporary losses from the Flubo Ransomware's 'locking' feature.

The Flubo Ransomware's earliest appearance in threat databases starts in late December of 2020, with no hints of how it's traveling the Web. Windows users should consider deactivating JavaScript and other threatening features while browsing, scan unusual e-mail attachments, and use strong passwords that will not let attackers brute-force their way into a network or server. At this time, the Flubo Ransomware's campaign may use either targeted or random circulation methods, although the latter is more likely.

Appropriate cyber-security services may further protect any PCs by blocking the usual infection-related exploits, such as privilege escalations and remote code executions. They also can delete the Flubo Ransomware from compromised systems in worst-case situations.

Free program generators are too useful for novice-level threat actors to pass up, even with many RaaS businesses thriving. As long as the Xorist Ransomware makes money, under the Flubo Ransomware name or another one, there's an incentive for more crime, extortion and locking of files.

Related Posts

Trending

Most Viewed

Loading...