Threat Database Ransomware Teeny Ransomware

Teeny Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 5
First Seen: February 11, 2019
Last Seen: September 17, 2019
OS(es) Affected: Windows

The Teeny Ransomware is an encryption ransomware Trojan that was first observed on January 31, 2019. The Teeny Ransomware is mainly designed to target devices located in Turkey and takes advantage of poor security protection. It is crucial to protect your devices from the Teeny Ransomware attacks, which can be quite destructive and make data permanently inaccessible.

The Damage Caused by the Teeny Ransomware is not Teeny at All

Most encryption ransomware Trojans target the user-generated files specifically, using a strong encryption algorithm to encrypt the files with extensions such as the following:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi.

The Teeny Ransomware uses a different approach that is much more destructive. The Teeny Ransomware overwrites the Master Boot Record of the affected computer's memory devices rather than encrypting individual files, and then restarts the computer. This makes the entire computer unusable since the operating system will not start up. The Teeny Ransomware does not make a backup copy of the original Master Boot Record, making the recovery of a Teeny Ransomware attack impossible completely. When the infected computer starts up, the following message (written in Turkish) appears on the victim's screen, written in red over a black background:

'dosyalariniz guclu bir algoritma ile sifrelendi.
key olmadan dosyalarinizi acmaya calimsmak diskteki tum verilerin yok olmasina ve zaman kaybina sebep olabilir.
dosyalarinizi kartmak icin altta buluman talimari izleyin.

luften talimari takip eidn.
1. altta bulunan bitcoin hesabina 200$ lik bir odeme gerceklestirin
btc req : [random characters]
2. odemeyi gerceklestirdikten sonra odeme yaptiginiz btc walletin id sini ve altta buluman id ile tarafimize mail atin.
e-posta: teeny@posteo.net
id: [random characters]
3. tarafiniza gonderilen keyi giriniz.
key: [input prompt]'

Below is a translation into English of the above ransom demand:

'Your files are encrypted with a powerful algorithm.
Trying to open your files without a key can result in the loss of all data on the disk and loss of time.
follow the instructions to find your files at the bottom.

Follow the instructions.
1. Perform a $ 200 payment to the underlying bitcoin account
btc req: [random characters]
After you have done the 2nd btc wallet id and the id at the bottom you want to mail us.
email: teeny@posteo.net
id: [random characters]
3. Enter the key that was sent to your side.
key: [input prompt]'

You will not be capable of recovering the data that has been damaged by the Teeny Ransomware attack, despite what the message says. Therefore, computer users should refrain from paying the $200 Bitcoin ransom that the Teeny Ransomware demands in its attack since it will be just a waste of money.

Protecting Your Data from Threats Like the Teeny Ransomware

The best way to keep your data free from attacks like the Teeny Ransomware is to have backup copies of all of your data. These copies should be stored on the cloud or an external memory device, away from the reach of threats like the Teeny Ransomware. It is also recommended to have a dedicated backup service, to minimize the data that is lost in an attack like the Teeny Ransomware. Having file backups ensures that the victims can recover their data after an attack of this type, removing any need to contact the criminals or consider paying any ransom.

SpyHunter Detects & Remove Teeny Ransomware

File System Details

Teeny Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe 7080eceaceef66c032ca0c9bc66b7c3c 2

Trending

Most Viewed

Loading...