TorrentLocker Ransomware Description
As a new file encryptor Trojan that borrows its structure and aesthetics from previous, unrelated threats, the TorrentLocker Ransomware continues the overall theme of encrypting files on infected computers and then demanding illegal ransom fees to restore the affected files back to readability. Although the TorrentLocker Ransomware uses ransom messages that misidentify the TorrentLocker Rnmsomware as a variant of the CryptoLocker Virus deliberately, malware researchers have verified that the TorrentLocker Ransomware is unrelated to CryptoLocker (or similar PC threats) in terms of code. The same precautions in use against other ransomware also should be used to protect against the TorrentLocker Ransomware attacks, or remove the TorrentLocker Ransomware, if necessary.
The Trojan File Locker with Less Originality than Malice
The TorrentLocker Ransomware was identified being circulated in recent phishing attacks, which may use e-mail attachments or mislabeled Web links to compromise vulnerable computers. Major TorrentLocker Ransomware campaigns, so far, have targeted Australian residents through fake e-mail-based invoice documents. Relevant file attachments are executable files, or EXE files, but are mislabeled to look like another, harmless file type, such as a text document. 'Parcel_information.exe' is one example of a file name used by the TorrentLocker Ransomware for its installation.
Like past ransomware families, the TorrentLocker Ransomware encrypts the files on your PC (using a relatively simple, Rijindael-based algorithm) to make them unreadable. The TorrentLocker Ransomware then displays ransom messages that resemble those of other, thoroughly-identified file lockers intentionally: CryptoLocker and CryptoWall Ransomware. However, malware experts have verified that the TorrentLocker Ransomware uses a weaker form of encryption than either of these two families, and is unrelated to them – except for superficially resembling them in its warning messages.
The TorrentLocker Ransomware does share a vulnerability in common with CryptoLocker and is unable to implement its file-encrypting attacks without first contacting its Command & Control server. Similarly, PCs that are compromised by the TorrentLocker Ransomware but lack Internet access also will be unaffected by current versions of the TorrentLocker Ransomware and its attacks. However, vulnerable machines, documents, audio files, images and other data could be encrypted and rendered potentially irretrievable.
Fighting Back Against the Torrent of File Lockers
Since the TorrentLocker Ransomware lacks major features besides copying the external details of other, more professionally-designed threat than itself, the TorrentLocker Ransomware currently is estimated to be unlikely to see the same in-depth development as other file encryptor Trojans. However, for victims who are affected, the TorrentLocker Ransomware may damage a wide range of files on your hard drive and may mislead some victims into paying its BitCoin ransom for file recovery. The TorrentLocker Ransomware also injects its primary file component into Explorer.exe, which is a normal Windows component, thus complicating identification or removal of the infection.
File types known to be targeted by the TorrentLocker Ransomware include documents like DOCX, XML spreadsheets, JPEG pictures and a range of other, specialized files, such as database files for SQLite software. Until the TorrentLocker Ransomware's servers are taken down by authorities, and its campaign brought to a halt, malware researchers encourage disconnecting infected PCs from the Internet and using anti-malware tools for deleting the TorrentLocker Ransomware (which, by default, will launch two separate copies of itself).
Instead of utilizing the TorrentLocker Ransomware's recommended BitCoin ransom to restore affected files, you should restore any files from a remote, uninfected backup. Due to the weakness of the TorrentLocker Ransomware's chosen encryption method relative to CryptoWall or CryptoLocker, it may only be a matter of time before third party tools for reversing the TorrentLocker Ransomware's attacks also become available to the public.
File System Details
|#||File Name||Size||MD5||Detection Count|
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.