Home Malware Programs Ransomware Gremit Ransomware

Gremit Ransomware

Posted: November 4, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 84
First Seen: November 4, 2016
OS(es) Affected: Windows


The Gremit Ransomware is a Trojan that may encode or delete your files, as well as display pop-ups asking for Bitcoins for restoring them. Most PC users should be able to reduce any damages from the Gremit Ransomware's payload to negligible levels by keeping backups in locations this Trojan can't access. Using specialized anti-malware software is the only means of uninstalling the Gremit Ransomware malware experts can endorse officially.

An Eye into a Trojan's Development

The process of creating and deploying a Trojan is as granular as that of any other kind of software development, and, sometimes, the PC security sector happens upon a sample that is a clear work-in-progress. The Gremit Ransomware is one of the newest of these threats, but already, its author has prioritized having fully-functioning encryption attacks before the rest of this Trojan's code is complete. Its campaign uses data encryption along with a simple lock screen window to block the compromised PC and force its operator to pay a ransom.

Most file-encrypting Trojans use AES-based algorithms for their data-encoding attacks, and the Gremit Ransomware upholds this pattern. The Gremit Ransomware targets files based on their directory locations, and current versions of the Gremit Ransomware only attempt encrypting the 'C:\Users\Tim\encrypt' folder. Although this restriction marks the Gremit Ransomware as a still-developing threat without a public release, the encryption attack is entirely functional at encoding, and blocking, any files in the relevant location. Currently, the Gremit Ransomware attacks data without checking for specific format types, which is a marked deviation from the strategies deployed by similar threats.

The Gremit Ransomware's more user-unfriendly attacks also include HTML pop-ups that it uses to block the desktop UI. Affected PC operators only are asked to pay a ransom of 0.03 Bitcoins (slightly over twenty USD) to restore their content to normal, a much lower demand than those of most data-ransoming Trojans.

Cutting Off a New Threat Campaign Before It can be Born

Although cheap, the Gremit Ransomware offers no more certainty than other threats that transferring money to the threat actor manning its administration panel will result in decryption help in return. Preferred strategies for recouping from these attacks rely on having backups that the Gremit Ransomware can't encrypt or delete, such as copying your files over to USB devices that aren't left plugged into the PC.

Content requiring decryption will include the new extension of '.rnsmwr' appended to any old extensions. Many families of file-encrypting Trojans are susceptible to decoding efforts by third parties, such as PC security companies willing to invest in freeware decryptors. If needed, ask for assistance in data recovery from appropriate entities before removing the Gremit Ransomware with your anti-malware program permanently.

Whether or not the Gremit Ransomware will prove profitable to its threat actor, is up to the actions and precautions of its potential victims largely. No matter how affordable a ransom for your files might be, malware analysts are always willing to remind PC owners that a good backup is even cheaper than a fraction of a Bitcoin.

Loading...