Ladon Ransomware

Ladon Ransomware Description

The Ladon Ransomware is an encryption ransomware Trojan. The Ladon Ransomware is designed to make the victim's files inaccessible just like many other encryption ransomware Trojans that are active currently. The purpose of these attacks is to make the victims' files unusable and then demand the payment of a ransom for the decryption key, which is essential to restore their files. Threats like the Ladon Ransomware are becoming more common increasingly, and it is why computer users should ensure that their data is safe from threats like the Ladon Ransomware.

File Backups are the Weapons to Kill this Dragon

PC security researchers first received information about the Ladon Ransomware on March 26, 2018. The Ladon Ransomware seems to be designed to target computer users in Russia. There are several reasons for this: the Ladon Ransomware is being distributed through the use of spam email messages targeting computer users in Russia and via bogus messages on Vkontakte, the main social network on Russia. The Ladon Ransomware also will detect the targeted computer's keyboard layout to detect whether it is using the Russian language. The Ladon Ransomware attack itself is simple to understand; the Ladon Ransomware will use a strong encryption algorithm to make the victim's files inaccessible. The Ladon Ransomware also will disable the Windows recovery features, such as the System Restore and the Shadow Volume copies of the victim's files. The Ladon Ransomware's attack is not different from most encryption ransomware Trojans that are being used to target computer users in these attacks currently. The Ladon Ransomware targets the user-generated files in its attacks, which may include images, videos, sound files and a wide array of document types. Some of the file types that are commonly targeted by these infections include:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The Ladon Ransomware's Ransom Demand

The Ladon Ransomware will deliver a ransom note to the victim's computer's desktop after encrypting the victim's files. This ransom note alerts the victim of the attack and asks the victim to install the Tor Browser to load a payment page on the Dark Web. The Ladon Ransomware is very similar to other ransomware in the Dharma 2017 family, and uses a very similar attack. One element it has in common with this threat is that the Ladon Ransomware provides the victim with a panel for 'chatting with an admin,' which supposedly allows the victims to get in touch with the cybercrooks directly.

Protecting Your Data from Threats Like the Ladon Ransomware

The best protection against threats like the Ladon Ransomware is to have file backups on a cloud-stored place or an external memory device. Having a way to recover the affected files easily means that victims do not need to pay the con artists to restore the files since they can delete the corrupted files and replace them with a backup. It is important to remember that it is not a good idea to pay the Ladon Ransomware's fee since there is no guarantee that these people will assist with recovering the files, and it is likelier that it will lead to additional losses.

Do You Suspect Your PC May Be Infected with Ladon Ransomware & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Ladon Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.