Threat Database Ransomware Russian Legion Ransomware

Russian Legion Ransomware

By GoldSparrow in Ransomware

The Russian Legion Ransomware Trojan is a variant of HiddenTear, a well-known encryption ransomware family that has been active since 2015. The Russian Legion Ransomware itself was first observed in May 2019. The Russian Legion Ransomware carries out a typical encryption ransomware attack, using a strong encryption algorithm to make the victim's files inaccessible, taking them hostage, and then demanding payment in exchange for returning access to the compromised data.

How the Russian Legion Ransomware Infection is Carried Out

The Russian Legion Ransomware attack is similar to most encryption ransomware Trojans. The Russian Legion Ransomware will generally be delivered via corrupted spam email attachments, corrupted online advertisements or fake online downloads. When the Russian Legion Ransomware gains access to the victim's computer, it will use the AES and RSA encryptions to make the victim's files inaccessible. The Russian Legion Ransomware targets the file types described below in these attacks:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

As soon as the computer user's files have been encrypted and rendered unusable, the Russian Legion Ransomware delivers a ransom note. The Russian Legion Ransomware's ransom note takes the form of text files dropped in various locations on the infected computer, as well as pop-up windows. The Russian Legion Ransomware ransom note asks the victim to pay a ransom using digital currency and contact the criminals via email. Computer users should ignore the contents of the Russian Legion Ransomware's ransom note and instead restore any data compromised by the Russian Legion Ransomware from backup copies.

Protecting Your Files from Threats Like the Russian Legion Ransomware

Most encryption ransomware Trojans carry out attacks similar to the Russian Legion Ransomware's, especially the countless HiddenTear variants that have been uncovered since this threat first emerged in 2015. Unfortunately, once the Russian Legion Ransomware damages the computer files, they will no longer be recoverable. Therefore, it is obvious why computer users need to take precautions against these threats. The single best way to ensure that your computer system and data are safe from threats like the Russian Legion Ransomware is to have backup copies of your files stored in a safe location. Having the ability to restore any compromised data from a file backup removes the criminals' leverage completely and makes the Russian Legion Ransomware attack ineffective. Apart from file backups, it is also crucial to have an updated security application installed.

Trending

Most Viewed

Loading...