Home Malware Programs Ransomware Charmant Ransomware

Charmant Ransomware

Posted: December 31, 2019

The Charmant Ransomware is a file-locking Trojan that's a variant of the previous GarrantyDecrypt Ransomware. The Charmant Ransomware can, as with many of its kin, use encryption-based attacks for stopping files from opening and create symptoms related to selling its decryption help for a ransom. Users should let their anti-malware tools uninstall the Charmant Ransomware and have backups ready in a secure place for recovering their work.

A Not-So-Charming Program for Users without Backups

While it's using a very different kind of ransom note from that of its closest genealogical relative, the Chch Ransomware, a new version of the GarrantyDecrypt Ransomware is, nonetheless, out in the wild. Its attacks depend on the standard approach of blocking content by encrypting it, although the ransoming methodology of the Charmant Ransomware is a little more off the beaten path. As always, a well-thought-out backup plan is any victim's best recourse against this file-locking Trojan.

The Charmant Ransomware's name is the French equivalent of the word 'charming,' although nothing else about the Charmant Ransomware's payload implies that it's targeting French speakers. The program locks media files with encryption – attacking such targets as documents, spreadsheets, or pictures – before giving them a 'charmant' extension and dropping its text message.

The Notepad TXT is an apparent modification of an old variant of the GarrantyDecrypt Ransomware, whose family includes various members, such as the 'tater@mail2tor.com' Ransomware, the '.metan File Extension' Ransomware and the Cammora Ransomware. The notable portion of the message is the use of Jabber and Youtube, which shows how criminals are incorporating public, live services into their extortion practices. Most other elements, such as the data loss warnings, are copy-pasted and aren't necessarily accurate descriptions of the Charmant Ransomware's capabilities or the risks to the victims.

Breaking Free of a Digital Molester's Charms

Despite its everyday practice and abuse, encryption remains a difficult-to-crack puzzle for even seasoned cryptographic researchers and programmers. The GarrantyDecrypt Ransomware and most of its variants have no simple 'unlocker' service besides the questionable, ransom-based ones that criminals provide. Due to the risk that the Charmant Ransomware infections pose to your files, malware researchers urge all PC users to back their data up to at least one additional device with appropriate security.

Fraudulent e-mail attachments, torrents, and fake updates being served through ad networks and Exploit Kits are examples of modern-day risks of file-locker Trojan infections. Business, NGO, and government servers also are at risk from brute-force-based attacks, although these are generally ineffective against users that maintain a reasonable degree of safe password practices. Users also can place themselves at less risk by installing security patches and turning off high-risk features like JavaScript and RDP.

Most anti-malware products, while incapable of unlocking files, will flag the GarrantyDecrypt Ransomware's relatives and should remove the Charmant Ransomware when appropriate on Windows devices.

The Charmant Ransomware using such a different choice of language from the youngest variant of its family, is a warning to the canny. With more than one threat actor using this Trojan group, the ways the Charmant Ransomware is traveling can be just as diverse.

Loading...