Home Malware Programs Ransomware Anon Ransomware

Anon Ransomware

Posted: September 21, 2020

The Anon Ransomware is a file-locking Trojan in-progress that's a variant of the DemonWare Ransomware. The Anon Ransomware includes most of the symptoms of this threat type, except for the encryption or another means of stopping the user's files from opening. Windows systems should have appropriate anti-malware services for removing the Anon Ransomware, and users still have backups for compensating for any Trojan attacks against their media.

A not Quite Anonymous (or Finished) Trojan

An almost, but not-quite file-locker Trojan needs only minutes of further development before it becomes a fully-working threat along with the likes of Hidden Tear, the STOP Ransomware or the Jigsaw Ransomware. The Anon Ransomware, the Trojan in question, is a very evident update to an older Trojan, the DemonWare Ransomware. However, these programs have a twist – they don't include a valid encryption routine feature. Despite a crippled attack capability, the Anon Ransomware exudes confidence in its extortion attempts, possibly, for bluffing the victims.

The Anon Ransomware is a Windows Trojan that adds extensions onto files for faking encryption – the notorious data-enciphering attack that stops files from opening. The Anon Ransomware also creates two ransom notes: a Notepad text file and a pop-up. The threat actor edits many of the details for differentiating it from DemonWare Ransomware and changes the ransoming method from a website-based one to a Bitcoin wallet and e-mail-based negotiation. The Anon Ransomware asks for fifty Euros, making its attacker's region of preference obvious. Nonetheless, file-locker Trojans often will cross national boundaries in their campaigns.

Currently, malware researchers rate the Anon Ransomware as a minimal threat to users. Since it doesn't lock files, removing the extensions that the Anon Ransomware adds will undo all cosmetic symptoms, and most anti-malware products should flag the Trojan and contain it. However, this harmlessness could change at a moment's notice, and all Windows users would be well-advised to keep their backups safe.

Further Insight beyond the Veil of Fake Anonymity

Although the Anon Ransomware offers a deadline before deleting the 'locked' digital media, this detail is a direct copy-and-paste from DemonWare Ransomware's note. Malware researchers see no signs of file deletion in the Anon Ransomware's payload, despite its prominence in other threats, such as the Jigsaw Ransomware variants. Still, users should save their backups to other devices to maximize the safety of any priceless documents, pictures or other data.

There are no ransoms in the Anon Ransomware's wallet, meaning that its campaign has a minimal financial incentive for continuing. Updates to the Trojan may make its attacks more potent by adding actual encryption routines (a trivial matter) or including the deletion that it warns of in its pop-up. Windows users should be mindful of interactions with downloadable content like torrents and e-mail attachments, and use strong passwords for heightening their security against brute-forcing attempts.

Reliable security suites with anti-malware features should find and remove the Anon Ransomware as a threat, despite its lack of bite to accompany its bark. Due to its relative insignificance, some companies may identify it with a generic, no-name threat entry.

The Anon Ransomware has little going for it against competing Trojans – for now. Such limitations are all too quickly mutable, though, and anyone who banks on an attacker's being helpless, instead of defending their PCs, deserves the data loss they're likely to experience.

Related Posts

Loading...