Home Malware Programs Ransomware 2048 Ransomware

2048 Ransomware

Posted: November 22, 2019

The 2048 Ransomware is a file-locking Trojan from the Ransomware-as-a-Service known as Dharma Ransomware or Crysis Ransomware. The family's attacks use encryption for blocking your media and also can cause other security issues, most notably, removing your backups. Have anti-malware services available for removing the 2048 Ransomware and maintain backups on separate devices for the most uncomplicated recovery possible.

Trojan Attacks with Semi-Technical Gags for Backup

The names that Ransomware-as-a-Service campaigns end up using can be whimsical or deadly-serious, depending on the mood of the criminal that's hiring the family. Previously, the Crysis Ransomware family is responsible for a healthy range of both themes, such as the Crash Ransomware, the HACK Ransomware, the 0day Ransomware, and the particularly-on-the-nose Rsa Ransomware. Now, yet another Trojan, the 2048 Ransomware, is being born into the family, using encryption for both its attacks and name.

The 2048 Ransomware is comparable to Rsa Ransomware, particularly, which, like it, references the same encryption method that the Trojans use for locking content. This signature attack of the RaaS family involves both AES-256 and RSA-2048 algorithms, which convert the data into a non-opening format, along with adding a cosmetic extension onto the name. This family also is one of many that malware experts note as being capable of deleting Windows backups, such as the Shadow Volume Copies or the Restore Points, which effectively turns the affected files into hostages.

Other elements in the 2048 Ransomware resemble those of its many ancestors in the Crysis Ransomware family. It employs a combination of Registry edits and Mutexes for its persistence and will block various data types, including DLLs, TXTs, INIs, JPGs and others. The file name changes it creates also include a serial related to the extortion process, and a campaign-specific address at a free e-mail service.

Keeping a Trojan's Numbers from Spelling Your Media's End

Any absolute protection against file-locking Trojans, whether from the 2048 Ransomware's family or other sources, such as the pseudo-public Jigsaw Ransomware, requires a backup. Malware researchers recommend saving backup solutions to removable devices that the 2048 Ransomware can't erase or access for encrypting. The decryption chances with freeware tools versus the Crysis Ransomware members remain extremely poor, except for some, considerably out-of-date variants.

Although the 2048 Ransomware generates a ransom note requesting that victims contact the e-mail for negotiating, doing so is a questionable decision financially. Criminals have the opportunity of ignoring any demands for help after taking their money due to the proliferation of cryptocurrencies and other, difficult-to-refund payment services. Paying the ransom doesn't trigger a recovery feature for the files that the 2048 Ransomware block automatically.

The 2048 Ransomware is another Trojan laughing at the expense of its victims by telling them just how it attacks – while making it evident that they can do little about it. Since encryption is a threatening, but user-friendly weapon, users without backups only can hope that they will not become targets.

Related Posts

Loading...