Home Malware Programs Ransomware Deal_for_access Ransomware

Deal_for_access Ransomware

Posted: June 22, 2020

The Deal_for_access Ransomware is a file-locking Trojan that can keep documents and similar media on your PC from opening. Its attacks include a ransom note that extorts money for an unlocker service that the attacker may or may not provide. Users should avoid paying, if possible, and restore their work through a backup after removing the Deal_for_access Ransomware through dedicated anti-malware tools.

When What Looks Normal in Your Folders is Far from It

As much has file-locking Trojans are a thoroughly-polished industry of Ransomware-as-a-Service franchises, single campaigns can come with surprises, both positive and negative. In the Deal_for_access Ransomware's case, a suspected member of the Hakbit Ransomware family (see also the Thanos Ransomware and the Quimera Ransomware) deviance from the norm serves only to make the victim's life even harder than usual. While it takes files hostage, it does so without leaving behind visual markers for identifying them.

The Deal_for_access Ransomware is, in many areas, similar to past threats, with a Windows-based, .NET Framework-dependent executable of a minute size. Samples for its campaign are available since late June, bearing completely-random filenames with no identifiable 'disguises' like a brand-name program or a certificate. The Trojan may terminate multiple applications through CMD commands so that it can achieve total file access, but its most essential attack is converting the user's files into encrypted formats.

The Deal_for_access Ransomware targets many of the usual suspects with this feature, including most documents and pictures. What makes the Deal_for_access Ransomware different from its suspected relatives, and most file-locker Trojans is the complete omission of a filename change – such as another extension – which would be the victim's best way of confirming what files can't open ordinarily. Instead, the Deal_for_access Ransomware gets its title from the name of its ransom note, a text file, which is very similar to the Hakbit Ransomware's equivalent message.

Paying for Questionable Data Access

Although the Deal_for_access Ransomware claims that it copies the user's media for leaking (or selling) for unpaid ransom scenarios, malware analysts can't confirm such attacks during the Deal_for_access Ransomware infections, for now. It is, however, likely that any attackers compromising a business network for ransoming also have access to passwords and similar credentials. Administrators should take appropriate precautions for re-securing their servers during the disinfection.

The Deal_for_access Ransomware also leverages a deadline (with details, likely, being inside the background of its wallpaper swap) for receiving payment. Victims should remember that threat actors can take their money and ignore further requests for assistance in some cases, or return the money with buggy solutions or even more attacks. Secure backups, mainly, non-locally-saved ones, are necessary for counteracting file-locking Trojans reliably urgently.

However, anti-malware services can detect and remove the Deal_for_access Ransomware, like similar low-level threats, without issues. Most vendors are identifying the Deal_for_access Ransomware generically as a non-specific Trojan.

The Deal_for_access Ransomware's originality is another obstacle that makes it even more difficult for users to face a costly proposition for data restoration. While one could choose to be thankful that the Deal_for_access Ransomware didn't delete so much content, rendering it invisibly worthless is nearly as bad.

Loading...