Trojan.Ransom.HM
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 12,069 |
Threat Level: | 50 % (Medium) |
Infected Computers: | 159 |
First Seen: | April 13, 2012 |
Last Seen: | July 19, 2023 |
OS(es) Affected: | Windows |
A ransomware Trojan detected as Trojan.Ransom.HM has been detected on various file-sharing websites and networks. Basically, Trojan.Ransom.HM will make the victim believe that their files have been encrypted, making them unreadable and unusable. Then, Trojan.Ransom.HM will demand a ransom in exchange for a decryption code in order to gain access to the infected computer's files. However, while many ransomware Trojans make this threat without actually doing anything to the victim's files, ESG security analysts have observed that Trojan.Ransom.HM actually does encrypt the victim's files. However, it is not necessary to pay Trojan.Ransom.HM in order to get your money back. ESG malware analysts have observed that Trojan.Ransom.HM's encryption is quite weak and that it should be easily cracked with security software from a reputable manufacturer that is fully updated as soon as a release that deals with the Trojan.Ransom.HM's encryption is released. Even if your files remain supposedly encrypted, Trojan.Ransom.HM should be eliminated with a reliable anti-malware tool. Paying Trojan.Ransom.HM's ransom gives no guarantee of every gaining back access to your files or of the Trojan.Ransom.HM infection being removed from your computer system.
Trojan.Ransom.HM Trojan Takes Your Files and Makes Them Unreadable
Creating malware that can encrypt files requires effort on the part of the criminals behind it. Because of this, most ransomware Trojans that threaten to encrypt your files will usually be issuing empty threats. However, Trojan.Ransom.HM targets some of the most common file extensions, including video, music, text, PDF and HTML files on the victim's computer system. Encrypted files will have their icon changed into a pink logo and will include the string '.EnCiPhErEd' after the file name. Various software manufacturers are analyzing the encryption that Trojan.Ransom.HM uses and have come to the conclusion that it is easily cracked; however, as of April of 2012, an update that can restore the encrypted files has not been released. Because part of the Trojan.Ransom.HM Trojan scam involves making the victim believe that their files were encrypted because of the infected computer's involvement in downloading illegal files over BitTorrent, Trojan.Ransom.HM Trojan is mostly prevalent on file sharing networks. As with most malware threats, the best way to deal with a Trojan.Ransom.HM Trojan attack is to avoid becoming infected with it in the first place. For this, it is essential to avoid unsafe websites (especially those associated with file sharing) and to keep your security software, operating system, and applications fully updated.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.