Threat Database Ransomware Honor Ransomware

Honor Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 6
First Seen: February 22, 2024
Last Seen: February 23, 2024

The Honor Ransomware is an encryption ransomware Trojan that was first reported on February 8, 2018. The Honor Ransomware is being delivered to victims through the use of corrupted spam email attachments. These email attachments will be delivered in email messages, which include social engineering techniques that make it seem as if the message is coming from a legitimate source, such as PayPal, Amazon or known news media websites. The Honor Ransomware belongs to a family of ransomware that includes the MyLittle Ransomware also known as the First Ransomware, which has been around for a while. PC security researchers suspect that the Honor Ransomware is still under development, as it seems that certain characteristics of the Honor Ransomware are still unfinished. Computer users should take preemptive steps to ensure that their data is safe from threats like the Honor Ransomware.

When the Word Honor Has a Twisted Meaning

Because the Honor Ransomware seems to be unfinished, PC security researchers have noted that the Honor Ransomware does not deliver a ransom note and its encryption method does not seem to be configured properly. PC security researchers have been capable of intercepting the Honor Ransomware's communications and determining details about its code and the way it encrypts the victim's files. The Honor Ransomware's attack is nearly identical to the numerous other encryption ransomware Trojans that are active currently. The Honor Ransomware will encrypt video, audio, images, and numerous other file types, targeting the user-generated files while avoiding the Windows system files and applications. The following are some of the file types that may be affected by ransomware threats like the Honor Ransomware:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The Honor Ransomware will rename each affected file, replacing the affected file's name with twelve random characters. The Honor Ransomware will add the file extension '.honor!' to the end of each affected file's name.

Protecting Your Data from a Threat Like the Honor Ransomware

The Honor Ransomware is capable of detecting whether the Honor Ransomware is being studied by malware researchers or whether it is part of an active attack. The Honor Ransomware connects to its Command and Control servers, delivering information about the infected computer. The Honor Ransomware will use a strong encryption algorithm to make the victim's files inaccessible, essentially allowing it to take the victim's files hostage. PC security researchers strongly advise computer users, therefore, to take steps to protect their files from the Honor Ransomware and similar threats preemptively.

The best you can do to be protected against ransomware Trojans like the Honor Ransomware is to have file backups stored on the cloud or an external memory device. Having file backups allows victims of the Honor Ransomware attack to restore their files after they have been corrupted, essentially preventing the cybercrooks from gaining the leverage they need to demand a ransom payment from the victims. A combination of effective backup procedures, a reliable security program that is fully up-to-date, and cautious practices when browsing the Web, are the best way to protect files from attacks like the Honor Ransomware. The infected PC users are counseled to refrain from contacting the people responsible for the Honor Ransomware attack or attempting to carry out a ransom payment.

URLs

Honor Ransomware may call the following URLs:

ademinetwork.azurewebsites.net

Trending

Most Viewed

Loading...