Threat Database Trojans Trojan.Ransom.HM

Trojan.Ransom.HM

By ZulaZuza in Trojans

Threat Scorecard

Ranking: 12,069
Threat Level: 50 % (Medium)
Infected Computers: 159
First Seen: April 13, 2012
Last Seen: July 19, 2023
OS(es) Affected: Windows

A ransomware Trojan detected as Trojan.Ransom.HM has been detected on various file-sharing websites and networks. Basically, Trojan.Ransom.HM will make the victim believe that their files have been encrypted, making them unreadable and unusable. Then, Trojan.Ransom.HM will demand a ransom in exchange for a decryption code in order to gain access to the infected computer's files. However, while many ransomware Trojans make this threat without actually doing anything to the victim's files, ESG security analysts have observed that Trojan.Ransom.HM actually does encrypt the victim's files. However, it is not necessary to pay Trojan.Ransom.HM in order to get your money back. ESG malware analysts have observed that Trojan.Ransom.HM's encryption is quite weak and that it should be easily cracked with security software from a reputable manufacturer that is fully updated as soon as a release that deals with the Trojan.Ransom.HM's encryption is released. Even if your files remain supposedly encrypted, Trojan.Ransom.HM should be eliminated with a reliable anti-malware tool. Paying Trojan.Ransom.HM's ransom gives no guarantee of every gaining back access to your files or of the Trojan.Ransom.HM infection being removed from your computer system.

Trojan.Ransom.HM Trojan Takes Your Files and Makes Them Unreadable

Creating malware that can encrypt files requires effort on the part of the criminals behind it. Because of this, most ransomware Trojans that threaten to encrypt your files will usually be issuing empty threats. However, Trojan.Ransom.HM targets some of the most common file extensions, including video, music, text, PDF and HTML files on the victim's computer system. Encrypted files will have their icon changed into a pink logo and will include the string '.EnCiPhErEd' after the file name. Various software manufacturers are analyzing the encryption that Trojan.Ransom.HM uses and have come to the conclusion that it is easily cracked; however, as of April of 2012, an update that can restore the encrypted files has not been released. Because part of the Trojan.Ransom.HM Trojan scam involves making the victim believe that their files were encrypted because of the infected computer's involvement in downloading illegal files over BitTorrent, Trojan.Ransom.HM Trojan is mostly prevalent on file sharing networks. As with most malware threats, the best way to deal with a Trojan.Ransom.HM Trojan attack is to avoid becoming infected with it in the first place. For this, it is essential to avoid unsafe websites (especially those associated with file sharing) and to keep your security software, operating system, and applications fully updated.

Trending

Most Viewed

Loading...