Home Malware Programs Ransomware AIDS NT 2020 Ransomware

AIDS NT 2020 Ransomware

Posted: September 7, 2020

The AIDS NT 2020 Ransomware is a file-wiping Trojan that deletes the user's media and pretends to hold it hostage. The Trojan includes a wallpaper hijacking and ransom demands, although there's no advantage to paying. Victims can disinfect their PCs with anti-malware products for removing the AIDS NT 2020 Ransomware after rebooting and disrupting the Trojan's startup routine.

A Screen-Sized Disease with Lying Symptoms

Since file-locker Trojans are popular and variable enormously, many victims may jump to conclusions about their security issues, according to the most apparent symptoms. However, this mistake can end up throwing good money after bad, and ransoms for nothing at all. For instance, the AIDS NT 2020 Ransomware is more than 'just' a Trojan and doubles as a tactic.

The AIDS NT 2020 Ransomware is targeting Russian speakers and uses Cyrillic in both its picture and its text ransom note. While malware experts can't confirm any features that would limit its attacks, for example, by avoiding installation for some language setups, the Trojan is compatible with most Windows releases. Without providing many details, its messages suggest that the Trojan is blocking files 'temporarily' and paying a ransom will recover or unlock them.

The AIDS NT 2020 Ransomware's tangible features are even more damaging than any encryption. The Trojan deletes or wipes files relatively indiscriminately and modifies Windows Explorer by removing hard drive shortcuts. Lastly, it changes the desktop's background into a warning image (with similar contents to its ransom note). Although the threat actor recommends messaging over Telegram, there isn't any benefit, and the Trojan has no fail-safe for restoring any files.

Safely Dealing with Masked Strangers on Your Desktop

The AIDS NT 2020 Ransomware is one of the numerous threats that style themselves after the Anonymous hacker-activist organization. Nonetheless, this is a much-used subject matter, and the Trojan has no links to Trojans like the Paycrypt Ransomware and older cases. Its distribution exploits and tactics for circulation are open to an investigation. Still, they are, as per the payload, likely of targeting Russian Web surfers through means such as semi-custom e-mail spam or torrents.

Some users may recover any files through the Restore Points, but for most attacks by file-wiper Trojans, malware experts find that only non-local backups are secure sufficiently. Besides cloud services, users also can consider detachable storage like USBs and network-attached storage drives. Password protection also is beneficial for preventing attackers from compromising as many files as possible.

Traditional anti-malware tools should identify this threat sufficiently and prevent its installation or remove the AIDS NT 2020 Ransomware after an infection. Although its name references the Windows NT, malware experts can confirm its compatibility with other versions.

The AIDS NT 2020 Ransomware insists on getting something for nothing, but this attitude of entitlement is endemic among Trojans and their masters. While it hides its features and identity behind masks, a bare minimum of good security habits and products will pull it into the light before it's too late.

Loading...