Home Malware Programs Ransomware AnonFive Ransomware

AnonFive Ransomware

Posted: March 22, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 53
First Seen: March 27, 2017
OS(es) Affected: Windows

The AnonFive Ransomware is a new version of Hidden Tear: a Trojan made as a demonstration of threatening file-encrypting programming. This version of the threat has been updated to deliver custom ransoming notes to its victims, which have the choice of paying and hoping that they receive a decryptor or resigning their files to being unreadable. Backups and free decryptors are helpful for undoing this threat's attacks, although you always should delete the AnonFive Ransomware before it can infect your computer.

An Example of Future Dangers to Come

A new threat actor going by the alias of 'Cyryx' seems to be gearing up an independent file-ransoming campaign. Since current versions of his Trojan, the AnonFive Ransomware connects to a dummy Web address, it's unlikely that attacks are underway as of this article's publication date. However, the threat industry moves rapidly, and malware experts estimate that the AnonFive Ransomware could be ready for being deployed against live targets at any time.

The AnonFive Ransomware is another version of Hidden Tear, which is the Turkish researcher Utku Sen's 'example' of a file-encryption Trojan that became popularized as a baseline for developing real ones quickly. The Trojan includes all of the main features of that project, including network connectivity to a potential Command & Control server. However, the AnonFive Ransomware uses a test URL that isn't under the threat actor's control currently, meaning that further updates are in high anticipation before the campaign launches.

The AnonFive Ransomware (and other variants of Hidden Tear) uses an AES-based encryption method for locking your local files, such as images, documents, archives or spreadsheets. The '.anonfive' extension at the end of each filename helps victims determine what content is under encryption. Meanwhile, the AnonFive Ransomware also creates a Notepad message on the desktop that includes the threat actor's ransoming instructions. Malware experts recommend against making the Bitcoin-based payments of Trojans like the AnonFive Ransomware particularly, which contain no protections against the possibility of the recipient refusing to provide the 'purchased' services.

The Shocking Simplicity of Hidden Solutions to the Hidden Tear Attacks

The efforts of various security researchers have paid off in the development of free decryption applications for counteracting the Hidden Tear family. However, this family is numerous and often goes through handling by different teams of threat actors, and no decryption-based solution ever can be guaranteed without any reservations. To compensate for possible updates that may make the AnonFive Ransomware's more secure than those of its relatives, malware experts suggest that you use backups for all of your most valuable files. Although Windows does keep the default backup data, Hidden Tear-based threats like the AnonFive Ransomware also include a default deletion feature targeting these copies.

The highly prolific and diverse nature of Hidden Tear Trojans makes estimating their distribution methods into an exercise with daily new developments. Con artists may introduce the AnonFive Ransomware to a system after compromising its login credentials, by disguising the AnonFive Ransomware in an e-mail attachment, or by forcing its download via a Web page hosted Exploit Kit. The AnonFive Ransomware also uses a small and highly-transportable executable that is easily concealable as another type of file, although many anti-malware products have high rates for removing the AnonFive Ransomware successfully.

Only PCs compatible with the Windows software are at risk for the AnonFive Ransomware. For those who are in this large subset of users, a daily backup can be more than just a chore; it also can be the only thing keeping your work from being a source of undeserved revenue.

Loading...