Home Malware Programs Ransomware FRFO Ransomware

FRFO Ransomware

Posted: December 8, 2020

The FRFO Ransomware is a file-locking Trojan that can block databases, documents, images, and similar content and hold it for ransom. Windows users should have suitably-safe backups for recovery for countering this Trojan's secure data encryption, which derives from the AES-Matrix Ransomware family. In addition to backing up their work, users can also keep cyber-security products available to remove the FRFO Ransomware as necessary.

Adding Another Brand-Name to the AES-Matrix Ransomware Business

Along with the NEFILIM Ransomware and several other families, the AES-Matrix Ransomware group is a long-known danger to businesses with unprotected networks or servers. Even though recent updates like the FRFO Ransomware have more than the most tentative changes to their internal workings rarely, the fact of the family's ongoing predation of weak targets makes for a constant reminder of gambles in opening random e-mails. Most attacks from this family use active targeting, and the FRFO Ransomware victims might make no mistake worse than choosing a poor password or not updating essential software.

The FRFO Ransomware is a Windows program with a just-over-one-megabyte size for its installation EXE. The Trojan's most immediate peril to victims is the blocking of files, which it does through a secure and efficient encryption feature that incorporates both ChaCha and RSA. As usual, for a family of Trojans of this distinction, there isn't a free unlocker for the FRFO Ransomware, and relatively little hope of one's development, thanks to the surrounding security.

When it completes the encryption, the FRFO Ransomware also adds extensions onto their names:

  • Bracketed e-mails (in this campaign's case, with the novelty of a Yahoo address)
  • An ID in two hyphen-separated blocks
  • The 'FRFO' string

Along with a traditional pop-up ransom note and a wallpaper background warning, these details are for soliciting ransoms from the victims in exchange for a file-recovering decryptor.

Throwing Obstacles in Front of the Newest Foray from Corporate Data Saboteurs

The FRFO Ransomware's family is less 'casual' than more widely-trafficked Trojans like Hidden Tear or the Xorist Ransomware, as one might see through the details of attacks by variants like the BNFD Ransomware, the ANN Ransomware, the RestorFile Ransomware, or the KOK8 Ransomware. Attackers deploying the FRFO Ransomware may use Remote Desktop features for compromising all available files on a remote network, hijack admin accounts with weak passwords by brute-forcing them or launch deliberate attacks over e-mail or instant messages. Despite the general preference for well-paying, corporate targets, the FRFO Ransomware also may incidentally harm Windows users' systems at home with the same file-blocking attacks.

The FRFO Ransomware deletes local backups, like nearly every file-locker Trojan that isn't an amateur-level project. Besides the need for a non-local recovery option, users also can protect their PCs by remaining aware of the most critical vulnerabilities. Out of these issues, malware analysts point out the following as highly-urgent:

  • Updating server software for resolving passive vulnerabilities, esp. publicly-known ones
  • Using strong passwords (both sufficiently complex and unique or non-default strings for the account and hardware in question)
  • Avoiding opening potentially-threatening documents, such as fake invoices, over e-mail or instant messages
  • Leaving abusable features such as JavaScript and macros off, when possible
  • Never leaving RDP features open to the internet
  • Diminishing admin privileges to as few accounts as possible

Paying ransoms for families like the AES-Matrix Ransomware is, often, expensive – thousands or tens of thousands of dollars, if not more. As a final barrier to infection and attacks, users also can depend on traditional PC security programs for blocking or removing the FRFO Ransomware efficiently.

Victims of the FRFO Ransomware's campaign haven't come forward with details on how it's circulating, but AES-Matrix Ransomware's admins tend towards the technically savvy. As of the last samples collected, businesses that don't guard their networks' perimeters might find a predator by the FRFO Ransomware's name breaching the gates.

Loading...