Home Malware Programs Ransomware Adr Ransomware

Adr Ransomware

Posted: November 27, 2020

The Adr Ransomware is a file-locking Trojan that blocks media such as documents by encrypting it. The Adr Ransomware also removes the files' names and replaces them with random characters and a static 'adr' extension. All Windows users should have secure backups for restoring any affected media and let a preferred anti-malware solution remove the Adr Ransomware from infected computers.

When Paying Attention to Typos Pays off for Trojan Victims

The way a file-locking Trojan gets onto a victim's computer is, perhaps, more critical than the well-established techniques it uses for harming any files. The Windows Trojan the Adr Ransomware runs with an easily-seen-through tactic, but it might be good enough to catch some Web surfers unawares. If the Adr Ransomware does so, the next steps include blocking most documents and other media and delivering ransom demands with a question mark for the price.

Besides the file-locking feature, which uses a currently-unidentified encryption algorithm, the Adr Ransomware also scrambles the names of the files it locks. These features don't conform to the Base64 style used by Scarab Ransomware's family, and malware analysts see no relationships between the Adr Ransomware other threats of this class. However, the symptom offers another problem for users struggling with identifying their files, although the Trojan is 'kind' enough to label them with 'adr' extensions, too.

However, the file copyright information on the Adr Ransomware is its more-unique characteristic and specific to its campaign. It hides as a fake Google updater program – but with the noticeable typo of 'updator.' Any pop-ups or download links may or may not include these references. Still, it shows how Web surfers can avoid tactics and other attacks by closely inspecting files before opening them.

Dodging Software Updates of Ill Intent

The Adr Ransomware is a .NET Framework-based program and requires a Windows environment, but is compatible with most OS versions. Its payload includes a Notepad ransom note with minimal information – besides an e-mail address for negotiating with the attacker, it drops in the Windows user's profile directory. Victims should reconsider paying the unknown ransom and check other backups, including the Windows Restore Points, for all recovery possibilities for their files.

Users have the best hopes of avoiding infections by staying clear of illegal and disreputable download resources, such as advertising networks, copycat domains with typo-based addresses, and torrents. They also should consider disabling or restricting the use of JavaScript, Flash, and Java, which prominently figure into drive-by-download attacks. Updates to software such as Google's Chrome or media players should always arrive through official channels, not unaffiliated websites or pop-ups.

Many anti-malware programs will flag and delete the Adr Ransomware and are dependable methods of disinfecting compromised Windows computers. Users on non-Windows devices also should remember that file-locking Trojans like the Adr Ransomware have competition that targets Android, macOS, etc.

The Adr Ransomware's most giant warning sign is a single letter's difference between the correct and incorrect spelling of a word. Even in the smallest of details, education pays off for those who don't forget it, and the Adr Ransomware's campaign might become a case of spelling bee winners quickly realizing that they're under attack.

Related Posts

Loading...