Home Malware Programs Ransomware Adhubllka Ransomware

Adhubllka Ransomware

Posted: January 16, 2020

The Adhubllka Ransomware is a file-locker Trojan that stops your digital media, such as documents, from opening with its encryption attacks. Associated symptoms are typical for its threat type and consist of extra extensions in filenames and a TXT ransom note. Users should ignore the ransom demands, restore their work from a backup, and prioritize deleting the Adhubllka Ransomware and disinfecting their system through trusted anti-malware services.

This Security Policy Police is a Wolf in Sheep's Clothing

As new, file-locker Trojans appear on the threat landscape, traditional strategies for concealment, code obfuscation, and sabotage of the victims' data come with them. Although it reuses some of the techniques and characteristics of older Trojans like the Jigsaw Ransomware spinoff of the YOLO Ransomware, the Adhubllka Ransomware has no distinct genealogical ties to that fear-mongering threat. Its independence merely expresses the ongoing profits, or perception of such, in its illegal industry.

The Adhubllka Ransomware is, like many of its competitors, a 32-bit Windows program. Although the installer pretends that it's 'lsass.exe' – AKA the Local Security Authority Subsystem Service, a Windows component – the program's memory process uses a random, gibberish name. After launching and conducting the usual persistence behavior, such as Registry changes, the Adhubllka Ransomware scans folders, including the desktop, for documents, images, audio, and other media that it can block by encrypting it.

The other symptoms of the Adhubllka Ransomware infections include the Trojan adding extra extensions (from the string in its name) to filenames and creating a TXT file in the same folders as the blocked media. The English-language instructions have few characteristics worthy of mentioning, although they do contain translation errors and questionable pricing specifications. As usual, the threat actor is depending on e-mail-based negotiations for selling his unlocking help.

Dodging Digital Extortion Before It Happens

The Adhubllka Ransomware's campaign shows no characteristics of being particularly well-funded, or even up to the level of a minor Ransomware-as-a-Service family. Most anti-malware utilities are identifying the Trojan, and it shows no advanced capabilities, such as the Shadow Volume Copy deletion. In this case, while malware experts recommend against assuming their availability, the Windows Restore Points could be a data recovery solution.

If the Restore Points do experience deletion, as per the norms of most file-locker Trojans, alternatives include freeware decryption utilities specific to this threat's encryption routine, and non-local backups. Users always should maintain the latter for keeping their work and personal digital files safe from encryption, which is both easily-programmed and sometimes-impossible to reverse. Only Windows systems are at risk from the Adhubllka Ransomware, although similar threats are targeting other OSes and even NAS devices.

Since detection rates are high, users have no reason for using anything other than appropriate anti-malware tools for deleting the Adhubllka Ransomware safely or blocking installation exploits. The price of the Adhubllka Ransomware's decryptor remains a factor with an unknown quantity. However, one shouldn't bet on criminals being generous when it comes to Trojans with profit-based payloads.

Loading...