Home Malware Programs Ransomware VenusLocker Ransomware

VenusLocker Ransomware

Posted: August 3, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 80
First Seen: August 3, 2016
OS(es) Affected: Windows

The VenusLocker Ransomware is a Trojan that uses file-encrypting technology to attack your PC. Any content that the VenusLocker Ransomware encrypts can no longer be read by associated applications, but may, in theory, be recoverable through a decryption routine. Because the VenusLocker Ransomware takes steps for protecting its decryption routine and has no free alternative currently, malware experts advocate disinfecting your PC and restoring your files from a backup after you've removed the VenusLocker Ransomware.

The Touch of a Greedy Goddess on Your Files

Borrowing the code of other projects to speed up a threat campaign's development is especially endemic to the industry of threatening file encryptors. The open-source EDA2 code is one origin point of a variety of these projects, with previous threats based on it including the AlphaLocker Ransomware and the Chilean SeginChile Ransomware. Now, malware experts also have identified the VenusLocker Ransomware, showing a possible shift back to the EDA2 source code, after a previous de-emphasis of it.

The VenusLocker Ransomware targets English-speaking regions and uses a conventional but difficult to revert encryption routine that it bases on an AES-256 algorithm with an RSA-2048 public key. The Trojan then sends the decryption key to a Command & Control server controlled by the remote attacker and displays several ransom messages. Like many other file encryptors malware experts see operating this year, the VenusLocker Ransomware uses three formats for its extortion messages: an HTML pop-up window, text and an image.

The VenusLocker Ransomware's pop-up message offers a for-a-price decryption service within seventy-two hours before the con artists delete the key and ask for a comparatively small ransom fee for this industry: 100 USD.

The VenusLocker Ransomware's text message, which it names a ReadMe file, offers identical content to its pop-up window but without the dynamic payment field.

The VenusLocker Ransomware's image delivers a less verbose version of its ransom demands, with recommendations including making contact with the con artists through e-mail for negotiations. The VenusLocker Ransomware also uses imagery implying (most likely falsely) a connection between the VenusLocker Ransomware campaign and the hacker-activist group Anonymous.

Unlocking Your PC from the Grasp of Venus

The VenusLocker Ransomware infections provide several clues for their immediate identification. They add '.venusf' extensions to all encrypted files, load automatic pop-ups and hijack the account's desktop background for ransom displaying purposes. However, there are no current free decryptors for the VenusLocker Ransomware, and a remote attacker may not provide any decryption assistance even after taking his Bitcoin payment. Stopping the VenusLocker Ransomware from installing itself is the most guaranteed method for keeping your data safe from becoming potentially unrecoverable.

PCs not connected to the Web during the VenusLocker Ransomware's installation, and, therefore, unable to provide communications to a C&C server, still may have the public key accessible. In such scenarios, contact a reputable PC security or repair technician for further decryption help. However, in more typical circumstances than the above, PC users will need to use backups that can overwrite the encrypted files with unencrypted data. Malware experts regularly recommend using cloud services and external devices for this purpose.

The VenusLocker Ransomware's ransom warnings offer both carrots and sticks to any victims: a promise of prompt assistance after payment, along with a time limit before its administrators delete your decryption key. However, paying a ransom instead of removing the VenusLocker Ransomware through traditional anti-malware strategies doesn't offer a guaranteed recovery, and does little besides fund future campaigns using misappropriated code for harmful acts.

Loading...