Threat Database Ransomware WanaCry4 Ransomware

WanaCry4 Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 1,971
First Seen: August 10, 2017
Last Seen: June 10, 2023
OS(es) Affected: Windows

The WanaCry4 Ransomware is one of the many copycat ransomware Trojans that have appeared in the wake of WannaCrypt0r or WannaCry Ransomware. This dangerous ransomware Trojan appeared in May 2017, and was responsible for thousands of infections around the world, gaining significant media attention. Since its release, criminals have released numerous malware infections designed to mimic its attack, in an attempt to make the victims believe that their computer was infected by this high profile Although the WanaCry4 Ransomware is not related to the infamous WannaCry, it does have the capability of carrying out an effective ransomware attack, making the victim's data completely unusable. Because of this, computer users should safeguard their data by taking precautions against ransomware Trojans such as the WanaCry4 Ransomware, which are becoming ever more common thanks to the availability of open source ransomware engines, RaaS outlets (Ransomware as a Service), and various other factors.

Another Ransomware that Makes You to 'WanaCry'

The most common way in which the WanaCry4 Ransomware is distributed is through the use of spam email messages. The victims will receive the WanaCry4 Ransomware Trojan in the form of a spam email attachment, which includes bad macro scripts that download and install the WanaCry4 Ransomware onto the victim's computer. The WanaCry4 Ransomware is part of a wave of ransomware Trojans released in July and August 2017 designed to mimic WannaCry and often based on Hidden Tear or other open source ransomware engines. To date, it is not certain whether there is a connection between these or if they were released by separate groups. The WanaCry4 Ransomware itself is based on CryptoWire, a well-known encryption ransomware Trojan family that first appeared in October, 2016.

How the WanaCry4 Ransomware Carries out Its Attack

Once the WanaCry4 Ransomware has been installed on the victim's computer, it connects to its Command and Control server to transmit information about the infected computer and receive data connected to the attack. The WanaCry4 Ransomware will scan the victim's computer for files with certain extensions, looking for Microsoft Office documents, images, audio, video, and files with commonly used files extensions. The WanaCry4 Ransomware will use the AES 256 encryption to make the victim's files inaccessible, attaching the file extension '.encrypted' to the end of each affected file. Once the victim's files are encrypted, the WanaCry4 Ransomware will demand that the victim communicates with the con artists using the email address 'shadowbroker_1@protonmail.com' to negotiate the amount required as payment for the decryption key required to recover the affected files. The people responsible for the WanaCry4 Ransomware demand a ransom payment of 1000 USD, to be paid in Bitcoins. The victims are given 72 hours to pay, claiming that their files will be lost permanently if the ransom fee is not paid within that time.

Dealing with a WanaCry4 Ransomware Infection

It is highly recommended not paying the ransom that the WanaCry4 Ransomware demands, as well as ransoms associated with other ransomware Trojans. There are several reasons for this:

  1. Paying the WanaCry4 Ransomware ransom allows the people responsible for the WanaCry4 Ransomware attack to continue developing and releasing threats by financing their operations.
  2. The people responsible for Trojans like the WanaCry4 Ransomware will rarely keep their promise to deliver the decryption key. They are just as likely to ignore the victim or to demand a higher ransom payment.
  3. Paying the WanaCry4 Ransomware ransom shows a willingness and ability to pay these ransoms, marking the victim prone to future threat attacks.

The best protection against ransomware Trojans like the WanaCry4 Ransomware is to have a reliable backup system in the cloud, an unmapped drive, or on an external memory device. Having the ability to recover the affected files from a backup invalidate the attack since there is no longer any need to pay the ransom.

Trending

Most Viewed

Loading...