Threat Database Ransomware Horros Ransomware

Horros Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 2
First Seen: April 11, 2018
Last Seen: December 5, 2020
OS(es) Affected: Windows

The Horros Ransomware is an encryption ransomware Trojan that was first observed in early April of 2018. The Horros Ransomware carries out a typical ransomware attack, encrypting victims' files and then demanding ransom payments in exchange for the decryption key that will be crucial to restore the affected files. Ransomware Trojans like the Horros Ransomware are becoming more common increasingly, and computer users need to take preventive steps to protect their data from this and other threat attacks.

The Horros Ransomware will Hibernate Your Files

The Horros Ransomware is delivered using spam email messages, but it can be distributed using other methods, such as taking advantage of unsecured RDP connections on the targeted computer. When the victims receive the Horros Ransomware via email, it will arrive in the form of a DOCX file with embedded macros that download and install the Horros Ransomware onto the victim's computer. The Horros Ransomware will use a strong encryption algorithm to make the victim's files completely inaccessible once installed on the targeted computer. The Horros Ransomware will target the user-generated files, which may include photos, music, and databases, while avoiding Windows system files or executable files. These threats do this because they depend on the victim being able to use the affected computer to make a ransom payment and contact the cybercrooks. The following are some of the file types that are commonly targeted in attacks like this one:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The Horros Ransomware runs as an executable file named 'FileEncrypter.exe,' and the files that are encrypted by the Horros Ransomware attack are easy to recognize because the Horros Ransomware will add the file extension 'horros' to the end of each affected file's name.

The Horros Ransomware Does not Deliver a Ransom Note

The goal of creating ransomware Trojans like the Horros Ransomware is to force computer users to pay large ransoms after taking their files hostage. To do that, these threats deliver a ransom note to the victim's computer. This ransom note will include instructions on how to pay and contact the cybercrooks. Since the Horros Ransomware does not deliver any ransom note or inform a way to contact the cybercrooks, then it is clear that the Horros Ransomware is either still in development or unfinished. However, the Horros Ransomware still carries out an effective ransomware attack that will make the victim's files unusable.

Protecting Your Data from the Horros Ransomware

While it may not be possible to restore the files affected by ransomware attacks like the Horros Ransomware, some sources have noted that there is a decryptor available for the Horros Ransomware infections. However, in most cases, recovering the files encrypted by these types of attacks is not possible. Because of this, preventive actions are the best measure to ensure that your data is always safe from these threats. The best preventive measure is to have reliable file backups stored on external memory devices, which can enable you to restore affected files after they have been compromised. Apart from file backups, malware researchers advise having a security program that is fully up-to-date to protect your data.

SpyHunter Detects & Remove Horros Ransomware

File System Details

Horros Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe 095ae02d1a70dbabccd47bd0d0a706eb 1

Trending

Most Viewed

Loading...