Threat Database Ransomware SONIC Ransomware

SONIC Ransomware

Most ransomware threats, which are lurking on the Web, have not been built from scratch but are based on other file-encrypting Trojans instead. This is the case with the newly uncovered SONIC Ransomware. This data-locking Trojan is a variant of the Jamper Ransomware. This is a well-used technique used by cyber crooks as it saves them time and effort.

Propagation and Encryption

It has not yet been confirmed with any certainty what is the infection vector utilized in the propagation of the SONIC Ransomware. Fraudulent pirated variants of legitimate applications, torrent trackers, and fake software updates are among the most popular propagation methods regarding threats of this type. The most common distribution technique, however, is spam email campaigns. These emails tend to contain a cleverly crafted message, which aims at convincing the user that it is safe to open the attached file. The attachment is macro-laced and thus far from safe. Once opened, it will allow the threat to infiltrate the targeted host. Then, the SONIC Ransomware will scan the system and locate the files, which it was programmed to target. When the scan is completed, the SONIC Ransomware will trigger its encryption process. When the SONIC Ransomware locks a file, it also changes its filename. This ransomware threat appends a '. SONIC' extension at the end of each file's filename. For example, a file that you had named 'dark-sun.jpg' originally will be renamed to 'dark-sun.jpg.SONIC' when the encryption process of the SONIC Ransomware is through.

The Ransom Note

Next, the SONIC Ransomware drops its ransom note named '---README---.TXT,' which states:

’All your important files are encrypted
There is only one way to get your files back: contact with us, pay, and get decryptor software.
We accept Bitcoin
You have Your personal identifier, write it in letter when contact with us.
Also you can decrypt 1 file for test, its guarantee what we can decrypt your files.
Attention!
Do not rename encrypted files.
Do not try to decrypt using third party software, it may cause permanent data loss.
For decrypt your data write to email
Contact information:
greenworksh@mail.com
greenworksh@countermail.com’

In the note, the authors of the SONIC Ransomware inform the users what has happened with their data and state that there is no other way to reverse the damage done to the files apart from paying the ransom fee demanded. However, the attackers do not mention what the ransom fee is. Instead, they demand that the victim contacts them via email to receive further instructions – ‘greenworksh@mail.com' and ‘greenworksh@countermail.com.' They also propose to decrypt one file free of charge to prove to the user that they are able to reverse the damage done.

We would advise you strongly to keep your distance when it comes to cybercriminals. There is no point in attempting to interact with them as they are shady, untrustworthy individuals who will attempt to convince you into paying them and will likely never deliver on their end of the deal. It is recommended to download and install a reputable anti-malware solution, which will help you wipe off the SONIC Ransomware from your computer and make sure you do not find yourself in such a situation again.

Related Posts

Trending

Most Viewed

Loading...