Threat Database Ransomware Rsa Ransomware

Rsa Ransomware

A new copy of the popular Dharma Ransomware has surfaced at the beginning of November. The name of this new data-encrypting Trojan is Rsa Ransomware. The creators of the Rsa Ransomware have borrowed the code of the prominent Dharma Ransomware and altered it ever so slightly to fit their needs. This is a very common approach taken by many authors of ransomware threats as it saves them time and effort.

Propagation and Encryption

The infection vectors utilized in the distribution of the Rsa Ransomware have not yet been confirmed. It is believed that the creators of this ransomware threat may be relying on spam emails to deliver this file-locking Trojan. This is done by deceiving the user into opening the corrupted attachment with a message riddled with social engineering tricks that urges them to launch the attached file. The file in question is macro-laced and carries the payload of the Rsa Ransomware. Authors of ransomware threats also are known to use bogus application updates and fake variants of legitimate software, among other methods of delivering these nasty Trojans. The Rsa Ransomware is meant to sniff out a long list of targeted filetypes. Usually, these would include the most popular file types, which any user would have on their computers. When these files are located, the Rsa Ransomware will begin the encryption process. Upon locking a file, the Rsa Ransomware also changes its file name. This data-locking Trojan applies a '.id-.[rsacrypt@aol.com].rsa' extension to the newly encrypted files.

The Ransom Note

The Rsa Ransomware's ransom note is fairly concise. The file holding the ransom message is called 'FILES ENCRYPTED.txt.' In the note, there is no mention of a specific ransom fee, but the attackers make it clear that once the user contacts them via email, they will receive further information. The email provided for this is ‘rsacrypt@aol.com.'

It is always best to avoid cybercriminals at all costs. This is why it is not advisable to contact the cyber crooks behind the Rsa Ransomware. Not only is there no guarantee that you will receive the decryption key, which you need, but if you pay up, your money will go to fund the attackers' future criminal activities. A much safer approach is to download and install a reputable anti-virus application and use it to remove the Rsa Ransomware from your system safely.

Related Posts

Trending

Most Viewed

Loading...