ScreenLocker Ransomware
Posted: September 16, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 42 |
First Seen: | September 14, 2015 |
---|---|
OS(es) Affected: | Windows |
The ScreenLocker Ransomware is a Trojan that restricts the PC owners' control over their machines until a survey process has been completed. This process may be used to collect your information (commonly known as 'phishing attack'), transfer money or expose you to other PC threats. If your computer is being victimized by a ScreenLocker Ransomware attack, you should use standardized anti-malware strategies and products to disinfect your machine while avoiding its lockdown (such as by switching to Safe Mode).
The Questionnaire Holding Your Desktop Hostage
People designing ransomware most often prefer to request money for direct payment in exchange for releasing any infected machines from the grips of their Trojans. However, there are other ways for third parties to profit off of similar attacks, including the ScreenLocker Ransomware's strategy: promoting fraudulent 'surveys.' While the ScreenLocker Ransomware's method of distribution remains unknown, malware experts have associated some components of this threat with fake Registry entries for Realtek, a legitimate company most well-known for its audio codecs and PC peripherals. This disguise could be an early indicator of installers for the ScreenLocker Ransomware hiding as updates for Realtek software.
The ScreenLocker Ransomware includes several features for disabling common security solutions, and will prevent the PC user from using Task Manager or Regedit, both of which are basic maintenance tools for Windows. However, the ScreenLocker Ransomware's main payload revolves around locking the Windows desktop and launching a pop-up alert that accuses the PC owner of using illicit software. While most ransomware-oriented con artists may use this opportunity for demanding cash payments, the ScreenLocker Ransomware, instead, redirects its victims to surveys that the ScreenLocker Ransomware claims will provide keys for unlocking your computer, post-completion.
A Reliable Skeleton Key for a Locked Screen
It should come as absolutely no surprise to any well-informed PC owner that legitimate software companies don't request the completion of surveys in exchange for software keys. Along those same lines, neither do they try to block the security tools of even an illegally operating OS. Third parties may exploit any information delivered through a ScreenLocker Ransomware survey for other attacks, such as spam e-mail. Malware experts can't endorse using this survey process for unlocking any PC, particularly since the people responsible for the ScreenLocker Ransomware's development have no pressing reason to honor illicit (and fundamentally dishonest) obligations.
Any PC infected by the ScreenLocker Ransomware is likely to experience severely restricted access to other programs, particularly essential security utilities. In these circumstances, malware researchers typically suggest making use of Safe Mode or, if needed, rebooting your PC from an external hard drive. Once you've used these steps for regaining access to any blocked programs, you should scan your PC with anti-malware tools able to delete the ScreenLocker Ransomware without any need to involve yourself in a fake survey process.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.