Home Malware Programs Ransomware Everbe Ransomware

Everbe Ransomware

Posted: May 21, 2018


The Everbe Ransomware is a part of the Everbe@airmail.cc Ransomware family of file-locking Trojans that can encrypt your pictures, documents, and other media so that they will not open. Since this family has no working decryption solution for the public for free, only unharmed backups can guarantee the safe recovery of these files. However, numerous brands of anti-malware software may eliminate the Everbe Ransomware automatically as being a threat to your PC, with no further action necessary.

May Trojans Bleeding into July

A small family of file-locker Trojans, starting with the Everbe@airmail.cc Ransomware and running through the PainLocker Ransomware and the Embrace Ransomware, is re-initializing its attacks against any PC owners with extortion-worthy files. The new version malware researchers can confirm, the Everbe Ransomware is arriving after a month of relative quiet on the part of this group of Trojans, which update their names and contact addresses periodically. The absence of any new encryption vulnerabilities makes it likely that all victims without backups will have their media affected permanently.

After installing itself through unknown exploits, the Everbe Ransomware runs an encryption routine that can lock files with either AES or DES algorithms, which it also secures with the RSA-2018 or the RSA-2048. The '.everbe' extensions and bracketed e-mail addresses this Trojan inserts into all filenames of locked media also provide victims with a direct way of searching for what content is under attack. The Microsoft Office work, such as Word's DOC documents, along with pictures, are two of the format types most frequently at risk from file-locker Trojans' payloads.

The Trojans of the Everbe Ransomware's family use Notepad messages for demanding money from any victims, with the information provided including a custom ID, an e-mail, an estimate of the ransom amount (starting, in some cases, at three thousand USD), and a warning of the cost doubling each week. The unlocking process requires access to the threat actor's database of RSA keys, and malware experts recommend saving backups for keeping the ransom negotiations from becoming the only theoretical way of restoring any files. Traditionally 'safe' backup locations include removable devices and most cloud storage services.

Preventing a Certain Trojan from Ever Being Your Problem

Threat actors may use different exploits for installing file-locker Trojans, depending on the intended victims. The business sector, governments, and NGO systems experience infection attempts using spam e-mails, disguised file attachments, and brute-force attacks against network logins. Although casual and random PC users may encounter the Everbe Ransomware through spam or similar methods, they also are vulnerable to fake software piracy downloads, corrupted advertising content, and exploit kits that hijack their Web-browsing content. Safe downloading behavior, careful password usage, and prudent security settings for all browsers may limit many of these attacks.

The non-consensual encryption of media, regardless of the format of the file, is, frequently, unbreakable. PC users with intact Windows Restore points may revert the system for recovering their documents and other work. Otherwise, having a backup on another device is the only restoration method that malware experts are verifying as being viable. Additionally, one out of every two brands of anti-malware applications, on average, are removing the Everbe Ransomware after detecting it accurately, and victims should use them in preference for disinfection over the risks of a manual uninstall.

While the Everbe Ransomware is the newest version of the Everbe@airmail.cc Ransomware that malware experts are confirming, for some time, it shows that some threat actors find its file-locking capabilities worth leveraging against competition like Hidden Tear and the Jigsaw Ransomware. However, no matter what the name might be, the solution is always as simple as backing your files up or gambling with losing them.

Related Posts

Loading...