Home Malware Programs Ransomware 1500dollars Ransomware

1500dollars Ransomware

Posted: November 24, 2020

The 1500dollars Ransomware is a file-locking Trojan of the Phobos Ransomware family that can block digital media by encrypting the files' internal data. The 1500dollars Ransomware also includes stereotypical symptoms such as adding extensions or creating ransom notes. As always, users should have backups for getting their work back without issue and have dedicated security services safely delete the 1500dollars Ransomware.

Trojans Being Direct about Their Expectations

As a spin-off of the still-running Crysis Ransomware's Ransomware-as-a-Service, the Phobos Ransomware remains of interest as a concurrent but competing business model. With the Banjo Ransomware, the Adage Ransomware, the 'fobosamerika@protonmail.ch' Ransomware, or the ELDAOSLA Ransomware, many threat actors consider it more than good enough. Since the threat actors' administrating each campaign can vary, it's helpful that some versions, like the 1500dollars Ransomware, offer upfront ransoming details.

The 1500dollars Ransomware's executable file, a Windows program, as usual, circulates with the name of '1500dollarsAntirecucaFullDB,' which malware experts note is a possible, albeit typo-marred, reference to the Recuva file recovery tool. The Trojan leverages features that are typical of the Phobos Ransomware family and others like it: encrypting digital media like documents, adding extensions to their names (in an ID, e-mail, and '1500dollars' extension format), and creating an HTA ransom note that it generates as a pop-up. The Trojan also comes equipped with a Restore Point-deleting feature and the ability to disable software or features that could interfere with the attacks.

Both the 1500dollars Ransomware's installer name and the ransom amount imply a campaign targeting vulnerable business entities. This strategy is favorable among threat actors who leverage tools for cracking weak passwords or use e-mail-based phishing lures, tricking workers into opening corrupted documents that install the Trojan through exploits. However, even Windows users at home run equal risks of having all their content blocked by the 1500dollars Ransomware's payload.

Turning the 1500dollars Ransomware into a Zero-Dollar Enterprise

Administrators have various options for curtailing attacks by the 1500dollars Ransomware and the other file-locking Trojans available to attackers through Ransomware-as-a-Services and other means. Chief among these is choosing properly-strong passwords, which will keep threat actors from breaking past login requirements and remotely accessing accounts. The 1500dollars Ransomware infections easily may cause permanent consequences for both workplace systems and home ones, thanks to no free encryption solutions, in this case.

Users also should inspect e-mails and text messages for potential dangers carefully, including obfuscated or shortened links, embedded advanced content or macros, and tactics such as fake invoices. Malware experts also recommend changing browser settings for maximum security, including turning off Flash, JavaScript, and other exploitable features, such as pop-ups. Security updates for software and file-sharing habits that don't partake in illicit content also are useful.

There are few anti-malware services incapable of identifying most variants of the Phobos Ransomware family. Users with adequate security solutions can delete the 1500dollars Ransomware without letting the encryption occur or disinfect their systems and recover from a backup.

Over a thousand dollars may seem steep for a PC's contents, but it depends on the target. Even an average, smaller business with a poorly-protected server could see the need to meet the 1500dollars Ransomware's ransom demand, even if it only encourages more of the same Trojans.

Loading...