BlackSheep Ransomware
Posted: May 30, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 55 |
First Seen: | May 30, 2017 |
---|---|
OS(es) Affected: | Windows |
The BlackSheep Ransomware is a Trojan that locks your files while pretending to be part of a Windows update. However, the Bitcoin ransoms this threat requests in exchange for giving you a decryption solution are redundant in comparison to the free solutions offered by the PC security sector. Malware experts also advocate for backing up any valuable files and using anti-malware programs for removing the BlackSheep Ransomware, whether before or after its install attempt.
The Fluffiest Brand of Extortion
A new member of the FTSCoder family is in live distribution as of late May and includes an operating system-specific way of hiding its attacks. With a social engineering exploit similar to the unrelated SecretSystem Ransomware, the BlackSheep Ransomware blocks files on an infected PC while keeping users from interrupting it by hiding itself behind a Windows update screen. Like most threat actors, the BlackSheep Ransomware's author is launching such attacks to collect Bitcoins afterward.
The BlackSheep Ransomware is circulating through unknown methods, but other Trojans with non-consensual encryption functionality may install themselves from e-mail attachments or corrupted website content. Its attacks encrypt JPG pictures, DOC documents, and other media with an algorithm meant to block other programs from opening them. Simultaneously, it also loads a no-border window with a fake Windows update image. Current samples include a notice with a typo ('untill') that victims can use to help identify the fraudulent notification.
Then, the Trojan replaces the first pop-up with a secondary one, which malware experts warn can lock your screen, thereby blocking access to the desktop. This new, HTML-based window reveals the BlackSheep Ransomware's identity while asking for a Bitcoin ransom equal to 500 USD. The threat actors also built several 'user-friendly' features into this attack, such as a decryption key field and a support button.
Shearing the BlackSheep Ransomware's Ransom Money
The BlackSheep Ransomware's authors are warning their victims to pay within fifty-four hours before facing additional consequences, such as the deletion of the decryption key. However, like most versions of BTCWare, the BlackSheep Ransomware is decryptable by a free software developed by the PC security sector. For threats more advanced than the BlackSheep Ransomware, but showing similar symptoms, malware analysts endorse using remotely-saved backups for an even more secure data recovery choice.
Threat actors may obfuscate the BlackSheep Ransomware inside of compressed RAR archives or disguise it as non-toxic content such as an e-mail memo. Since this Trojan causes substantial data loss, albeit temporarily, most users should try to block the installation exploits that lead to an infection. Anti-malware products of various brands can uninstall the BlackSheep Ransomware, although recovery of any locked content is, as noted previously, the purview of more specialized software.
As usual, paying attention to details pays off for any PC user with even the most superficial familiarity with what is and isn't secure or standardized for the Windows systems. Hopefully, the BlackSheep Ransomware's authors will not update this threat to make its disguise any more convincing.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.