Home Malware Programs Ransomware AngryKite Ransomware

AngryKite Ransomware

Posted: April 3, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 4
First Seen: April 3, 2017
OS(es) Affected: Windows


he AngryKite Ransomware is an updated version of the KRider Ransomware, which uses an AES cipher to lock your files. The AngryKite Ransomware variant of this program also drops fake technical support messages to trick the victim into paying money for a decryption solution that the threat actor is unlikely to provide. Refrain from paying these ransoms and use both anti-malware products for deleting the AngryKite Ransomware and backups for keeping any files from being locked permanently.

March Trojans Flying High as Kites in April

In its early stages, the KRider Ransomware campaign was a curiosity for lacking any extortion-related components, such a ransoming messages or e-mail links. Threat actors with access to the Trojan's code are alleviating that missing piece of the project and supplementing the ransom demand with a social engineering tactic. In its newest form, the Trojan uses the name AngryKite Ransomware and is in distribution with fake file data implying that it's a 2016-developed, Microsoft-affiliated application.

The AngryKite Ransomware still uses the AES-based encryption techniques to lock your files. The files that the AngryKite Ransomware locks are detectable by their overwritten names and appended '.NumberDot' extensions, and can include over a hundred formats of data. However, malware experts find the most interesting component of the AngryKite Ransomware in its last symptom, the pop-up window that it deploys to collect its ransoms.

The AngryKite Ransomware displays a window masquerading as a security alert from unspecified software, claiming that your PC is under attack by a combination of rootkits and spyware (both of which are high-level threats capable of taking control over the PC or collecting confidential information). The AngryKite Ransomware displays a fake technical support hotline, asking you to call to prevent any further damages. This hoax allows the AngryKite Ransomware's threat actors to collect ransom money while pretending to help you disinfect your computer or recover your encrypted files.

Calming the Winds of Trojan Hoaxes

The new 'plot twist' in the KRider Ransomware story may emphasize additional layers of deceptive marketing, but the AngryKite Ransomware is, internally, little changed from its ancestor. Malware experts advise against paying the AngryKite Ransomware's threat actors any fees they demand, especially since the Trojan is basing itself off of threats that fail to save the required decryption information explicitly. However, preliminary investigations from within the anti-malware industry are suggestive of researchers being able to provide file-unlocking services for the AngryKite Ransomware for free.

Because the AngryKite Ransomware is only verifiable for being in distribution recently, malware experts have yet to cover all of its installation exploits. Freely-downloaded software bundles, mislabeled e-mail attachments, website script exploits and RDP hacking attacks are some of the popular methods of circulating encryption-based threats currently. Use anti-malware products, when possible, to delete the AngryKite Ransomware before it starts scanning your files, or isolate it for further analysis and decryption afterward.

To get ransom money, it may not be enough to take away a victim's digital belongings. Con artists may use false information, as with the AngryKite Ransomware's attacks, to encourage their victims into the desired course of action. However, an extortionist-recommended solution is in your best interest rarely, and you always should look on it as your final resort.

Loading...