Home Malware Programs Ransomware Angela Merkel Ransomware

Angela Merkel Ransomware

Posted: November 15, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 42
First Seen: November 15, 2016
OS(es) Affected: Windows

The Angela Merkel Ransomware is a new member of the Exotic Squad Ransomware family. Like all branches of that family, the Trojan encrypts your file's with an algorithm intended to lock them out of being used until you pay its ransom. The Angela Merkel Ransomware has the potential to damage other software and data permanently, and using anti-malware protection to delete the Angela Merkel Ransomware during its installation is highly encouraged.

When Politics Comes into Your Computer

Many of 2016's file-encrypting Trojans have taken turns for the whimsical, with brands and themes suggestive of everything from hacktivist movements to popular television shows. Arguably, it was inevitable that a new Trojan with encryption for its payload would take up a political theme, as malware experts find while examining the Angela Merkel Ransomware. Although it doesn't appear to be an 'official' update of that family, the Angela Merkel Ransomware's code is nearly identical to that of the Exotic Squad Ransomware.

The Angela Merkel Ransomware targets files in specific locations, most often including the sub-directories within the Windows Users folder. Then, the Trojan encodes all data saved there with an encryption cipher, such as AES-128, making them unintelligible to all associated applications. Program files, such as EXE executables, are not exempt necessarily, which means that the Angela Merkel Ransomware could block other applications, requiring their re-installation.

theme of the Angela Merkel Ransomware's ransom campaign to sell a data decryptor back to its victims uses imagery of the controversial politician, Angela Merkel, along with a partially multi-lingual message targeting both German and English speakers. Malware experts also saw the Angela Merkel Ransomware leveraging massive extortion sums of over one thousand USD, meaning that the Trojan's campaign most likely is targeting major businesses or even government systems.

Casting Your Vote Against the Angela Merkel Ransomware

Fortunately, malware experts were able to confirm at least one of the Angela Merkel Ransomware's installation exploits: fake Chrome updates. These hoaxes are in a particularly close association with the drive-by-download attacks that exploit kits enact by scanning your Web browser for passive vulnerabilities. Simple defenses against an EK include keeping your browser patched, disabling in-browser scripted content, and having browser-monitoring protection.

In the future, free decryption of content already encoded by the Angela Merkel Ransomware may be possible. Previous Trojans from the same family use the '.exotic' extension, but the Angela Merkel Ransomware appends '.angelamerkel' as a thematic alternative. Since this Trojan's decryption possibilities are unclear, you should consider protecting your files with backups while relying on anti-malware protection for removing the Angela Merkel Ransomware proactively.

tTe Angela Merkel Ransomware's campaign tilts itself towards PC owners within the European Union, but, no matter where you live, ignoring backups of important work is as good as casting a vote for a con artist's profits.

Loading...