Home Malware Programs Ransomware ATLAS Ransomware

ATLAS Ransomware

Posted: April 20, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 17
First Seen: April 20, 2017
OS(es) Affected: Windows

The ATLAS Ransomware is a minor variant of the file-encrypting CHIP Ransomware, which locks files, such as documents, by enciphering them. Symptoms for identifying and the ATLAS Ransomware infection include various changes to the names of all encrypted media, as well as the presence of text messages ransoming the decryptor. Decryption can be impossible for threats of this category, which is why detecting and removing the ATLAS Ransomware with anti-malware products before it scans your hard drive is the recommended solution.

Last Year's Trojans Throwing Their Chips Back into the Pot

Although file-encrypting Trojans often change their names, the code threat actors use in their attacks is somewhat less subject to frequent fluctuation. Old brands of threatening software often may see reuse almost in their entirety such as the transition from the 2016's CHIP Ransomware to the 2017's ATLAS Ransomware. In both cases, the immediate risk is the possibility of losing data on your PC as the Trojan locks it with a secure, non-symmetrical encryption method.

In comparison to the older Trojan, most of the ATLAS Ransomware's changes are aesthetic, including different extensions on the files it holds hostage and an updated ransoming message. The Trojan encrypts content including Excel spreadsheets and Adobe PDF documents with a combination of the AES and RSA-512 algorithms, rendering them locked indefinitely. Identifying all affected files also may be difficult, due to the Trojan's overwriting the original names with semi-random hash strings. To determine what content is locked, malware experts recommend searching your drives for the '.ATLAS' extension at the end of each filename.

The ATLAS Ransomware also creates Notepad text files containing messages from its threat actors. The ransom notes provide minimal information other than discouraging the use of third-party decryptors and providing several e-mail addresses for negotiating purposes. Con artists-provided decryptors often fail to function as intended and, in some cases, may not even be made available after the cash transfer.

Weakening the Grip of the ATLAS Ransomware on Your Files

Threat actors maintaining the ATLAS Ransomware's development also have existing ties to the RIG Exploit Kit, particularly for deploying file-encrypting threats like this Trojan's immediate ancestor. Such attacks can take advantage of passive vulnerabilities on your Web-browsing software and install the ATLAS Ransomware automatically. Being cautious about which features you enable on suspicious websites and having an anti-malware product that includes unsafe URL-monitoring can block many of these attacks.

The encryption routine in use by the ATLAS Ransomware and the CHIP Ransomware is not at risk of being cracked by third-party researchers in the security sector notably. Always back your files up to secondary devices or cloud servers to reduce any potential the ATLAS Ransomware has for causing data loss that you can't recover from in full. Since the encryption function isn't instantaneous, there also is a window of time for anti-malware products to find and remove the ATLAS Ransomware safely.

The ATLAS Ransomware is an expected byproduct of an underground industry that profits from hiding its history and faking the sophistication behind their file-ransoming attacks. The security standards and products that are capable of protecting your hard drive from CHIP Ransomware should remain functional here, keeping the question of paying ransoms out of consideration.

Related Posts

Loading...