Home Malware Programs Trojans Win32:Ransom-AOQ

Win32:Ransom-AOQ

Posted: August 21, 2013

Threat Metric

Threat Level: 6/10
Infected PCs: 96
First Seen: August 21, 2013
Last Seen: October 17, 2019
OS(es) Affected: Windows

Win32:Ransom-AOQ is a Russian encryptor ransomware Trojan that encrypts your files with a code to make them unusable, thereafter providing information that will allow you to purchase a decryption key from the criminals responsible for the attack. Unlike many other kinds of ransomware, SpywareRemove.com malware experts haven't seen any signs of Win32:Ransom-AOQ attempting to portray its attacks as being authorized by your local police or any other legal entity, but Win32:Ransom-AOQ's encryption attacks are real and should not be ignored. There are several means of dealing with encryption-related attacks, but it's especially recommended for you to keep remote backups of all important documents and delete Win32:Ransom-AOQ with anti-malware software after its presence has been confirmed.

Win32:Ransom-AOQ: a Monster with a Tentacle On Each of Your Files

Win32:Ransom-AOQ is ransomware that's distributed through spam e-mail and similar attacks, with its Trojan dropper disguised as a harmless PDF file. While opening the file in question does display a real PDF, the Trojan dropper also installs Win32:Ransom-AOQ in the background. This means of installation is very common for e-mail-distributed PC threats, but SpywareRemove.com malware researchers were somewhat surprised at the extent of Win32:Ransom-AOQ's payload – even as far as ransomware goes.

Once Win32:Ransom-AOQ is installed, Win32:Ransom-AOQ encrypts most major file types on your PC, including major formats for documents, music, movies and images. This encryption attack makes all affected files temporarily unusable, and Win32:Ransom-AOQ also adds an additional file, KRAKEN.txt, into most directories. This new file contains instructions for contacting the criminals who designed Win32:Ransom-AOQ and paying them (through either WebMoney or Bitcoins) to acquire the decryption key. Notably, Win32:Ransom-AOQ makes an explicit effort to delete any file backups that are stored on your hard drive – necessitating the use of a remote source if you want to restore your files from a backup. Folders affected by Win32:Ransom-AOQ's attack include those in remote network locations or in removable devices.

How to Wiggle Your Way Out of a Win32:Ransom-AOQ Ransom

Win32:Ransom-AOQ is exceptional, as far as ransomware attacks go, for its lack of pretensions, its genuine implementation of an encryption attack and, unfortunately, the defenses Win32:Ransom-AOQ uses to keep you from easily undoing that attack. SpywareRemove.com malware researchers sadly have confirmed that Win32:Ransom-AOQ includes some additional functions that allow Win32:Ransom-AOQ to delete any encrypted files under various circumstances – including any attempts on your part to access free decryption utilities. However, while these issues make removing Win32:Ransom-AOQ freely more difficult, paying the ransom demanded by Win32:Ransom-AOQ remains, ultimately, unnecessary and unrecommended.

SpywareRemove.com malware researchers can point out a specific solution for PC users who are using proxy servers or otherwise have access to means of passively logging network traffic. These services also can be used to acquire the decryption key from Win32:Ransom-AOQ's server communications and reverse its encryption attack. However, the best means of protecting your files from Win32:Ransom-AOQ simply is storing backups of all important files on an inaccessible remote device (USB drive, CD, etc). Once you've deleted Win32:Ransom-AOQ with an anti-malware program of your choice, you can restore your files from the untouched backup without needing to pay even a coin of Win32:Ransom-AOQ's ransom.

However, none of this would be necessary in the first place if, as SpywareRemove.com malware analysts recommend, you avoid dangerous sources of file downloads, including the spam messages through which Win32:Ransom-AOQ distributes itself.

Loading...