Home Malware Programs Ransomware Blackout Ransomware

Blackout Ransomware

Posted: July 17, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 9
First Seen: July 17, 2017
OS(es) Affected: Windows

The Blackout Ransomware is a Trojan that locks your files with encryption and disguises its extortion demands as technical support for circumventing its license agreement. Until more data is available about its encryption methods and the likelihood of decryption, malware experts recommend using backups, when appropriate, for recovering from this threat's attacks. Some anti-malware programs also may delete the Blackout Ransomware immediately before it encodes anything, which is an asymptomatic activity.

Trojans with Lessons in Creative Writing

While technical know-how will always be invaluable to those seeking to subvert PC security, threat actors also are learning to depend on the gullibility of those whom they attack for making money. Various social engineering techniques, such as fake software tactics or forged e-mail messages, often play parts in distributing Trojans and other threatening software. Now, with the upcoming Blackout Ransomware campaign, malware experts even are finding Trojans trying to pretend they're not illegal after an attack.

The Blackout Ransomware is a Trojan that uses a still unknown encoding method for encrypting the victim's media, which lets it block content like documents or pictures. The Blackout Ransomware also creates a custom string of alphanumeric characters to serve as the infected PC's identification number, which is unique to each attack. Like other file-encrypting Trojans, the Blackout Ransomware prevents the user from opening any of the content it locks until after they run it through a corresponding decryption application that's specialized for the Blackout Ransomware and requires the algorithm's key.

Other than locking arbitrary formats of files, the Blackout Ransomware also distinguishes itself by the plaintext-based ransom note it drops. Most of the details of this message are similar to those of attacks like variants of the Globe Ransomware or the Jigsaw Ransomware campaigns. However, the Blackout Ransomware's author tries to disguise its attack as being part of a 'license agreement' and a legal demonstration of encryption technology on the Windows OS without any intent to do harm. This cover story is similar to the original purpose of Utku Sen's Hidden Tear program.

Malware experts emphasize that other characteristics in these instructions, such as the request to use the anonymity-providing TOR browser, imply that the above cover story is entirely false. Programmers meaning to distribute encryption-based programs without causing damage have no reason to avoid bundling the decryptor with them, whereas the Blackout Ransomware's threat actor is withholding his decryption application for ransom.

Turning out the Lights on an Easy Lie for Money

Although its file data implies that its campaign is trying to circulate the Blackout Ransomware with the appearance of a legitimate program, almost all details of the Blackout Ransomware's payload show that the Trojan is meant to damage your PC by preventing you from opening digital media. Backups that you schedule beforehand and save to devices that can't be infected are always a simple means of avoiding permanent damage from these attacks. If you lack backups for restoring any barred files, malware experts recommend creating copies of any encoded content and testing different, free decryption programs made available by third-party security researchers.

Paying any fees the Blackout Ransomware's author may request isn't a way of regaining any blocked files necessarily. Almost all Trojan attacks using file-encrypting features specify payment methods that eschew standard legal protections for hoaxes, such as chargebacks. Therefore, the con artists can simply take their payments without needing to give you any decryption help even though they may provide an initial 'free sample' of their services. Blocking and deleting the Blackout Ransomware with a standard anti-malware product remains the only means, besides possessing backups, of confirming that your local content can't suffer damage that's irreversible.

While the space for file-encryption attacks is bustling, con artists are all too happy to try various tricks to make old software seem new. Falling for 'license agreements' delivered after the fact, like the Blackout Ransomware's text, is little better than putting your trust into a Nigerian loan tactic.

Related Posts

Loading...