SONIC Ransomware Description
Most ransomware threats, which are lurking on the Web, have not been built from scratch but are based on other file-encrypting Trojans instead. This is the case with the newly uncovered SONIC Ransomware. This data-locking Trojan is a variant of the Jamper Ransomware. This is a well-used technique used by cyber crooks as it saves them time and effort.
Propagation and Encryption
It has not yet been confirmed with any certainty what is the infection vector utilized in the propagation of the SONIC Ransomware. Fraudulent pirated variants of legitimate applications, torrent trackers, and fake software updates are among the most popular propagation methods regarding threats of this type. The most common distribution technique, however, is spam email campaigns. These emails tend to contain a cleverly crafted message, which aims at convincing the user that it is safe to open the attached file. The attachment is macro-laced and thus far from safe. Once opened, it will allow the threat to infiltrate the targeted host. Then, the SONIC Ransomware will scan the system and locate the files, which it was programmed to target. When the scan is completed, the SONIC Ransomware will trigger its encryption process. When the SONIC Ransomware locks a file, it also changes its filename. This ransomware threat appends a '. SONIC' extension at the end of each file's filename. For example, a file that you had named 'dark-sun.jpg' originally will be renamed to 'dark-sun.jpg.SONIC' when the encryption process of the SONIC Ransomware is through.
The Ransom Note
Next, the SONIC Ransomware drops its ransom note named '---README---.TXT,' which states:
’All your important files are encrypted
There is only one way to get your files back: contact with us, pay, and get decryptor software.
We accept Bitcoin
You have Your personal identifier, write it in letter when contact with us.
Also you can decrypt 1 file for test, its guarantee what we can decrypt your files.
Do not rename encrypted files.
Do not try to decrypt using third party software, it may cause permanent data loss.
For decrypt your data write to email
In the note, the authors of the SONIC Ransomware inform the users what has happened with their data and state that there is no other way to reverse the damage done to the files apart from paying the ransom fee demanded. However, the attackers do not mention what the ransom fee is. Instead, they demand that the victim contacts them via email to receive further instructions – ‘email@example.com' and ‘firstname.lastname@example.org.' They also propose to decrypt one file free of charge to prove to the user that they are able to reverse the damage done.
We would advise you strongly to keep your distance when it comes to cybercriminals. There is no point in attempting to interact with them as they are shady, untrustworthy individuals who will attempt to convince you into paying them and will likely never deliver on their end of the deal. It is recommended to download and install a reputable anti-malware solution, which will help you wipe off the SONIC Ransomware from your computer and make sure you do not find yourself in such a situation again.
Do You Suspect Your PC May Be Infected with SONIC Ransomware & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like SONIC Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.