Home Malware Programs Ransomware Fake WindowsUpdater Ransomware

Fake WindowsUpdater Ransomware

Posted: April 6, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 9
First Seen: April 6, 2017
Last Seen: October 18, 2020
OS(es) Affected: Windows

The Fake WindowsUpdater Ransomware is a Trojan that takes your files hostage by encrypting them with an AES-256 algorithm. The Fake WindowsUpdater Ransomware asks its victims to pay a Bitcoin ransom to have their media decoded, although such payments may not induce any provision of a working recovery solution. Backups and free decryption efforts from trustworthy anti-malware researchers may restore your files, although you always should try to detect and remove the Fake WindowsUpdater Ransomware before it attacks.

The Updates with Results You wouldn't Expect

Hiding until it can deliver the full impact of its payload is a priority for most Trojans, although their disguises can take a variety of formats. One Trojan campaign malware experts are just beginning to analyze in depth uses two methods of concealing itself temporarily, after which it can take your files hostage and withhold them for ransoms. This threat, the Fake WindowsUpdater Ransomware, offers easily configurable options in its end-of-file data, and its authors even chose to use disposable e-mail addresses.

As per its name, the Fake WindowsUpdater Ransomware's core executable mislabels itself as an update service for the Microsoft's Windows OS. Since some samples of the Trojan also use incorrect extensions implying that they're text documents for financial data, malware experts can point to e-mail spam as being a highly likely means of propagation. After the installation, the Fake WindowsUpdater Ransomware searches all drives for over six hundred formats of data, including many major types of media. The Fake WindowsUpdater Ransomware encrypts and locks any appropriate files with an AES algorithm using the ECB mode and a 256-bit size key.

The Trojan also contacts a C&C server to upload the system and attack data, including the victims' identifying code and the key for deciphering their encrypted media. One of its last symptoms launches a pop-up window asking for 0.02 Bitcoins to give you the decryption code and unlock the files.

Transitioning from Cheap to Free File Salvaging

The Fake WindowsUpdater Ransomware asks for under thirty US dollars in cryptocurrency, a sum that makes it clear that its threat actors only are comfortable attacking recreational users, rather than corporate entities. However, surveys of all samples from malware experts have determined that the Fake WindowsUpdater Ransomware is at high probability for being decryptable without any help from its threat actors. Contact trustworthy anti-malware industry analysts for decryption aid, if you need it, or use backups to overwrite the Fake WindowsUpdater Ransomware's locked files.

This Trojan is a possible relative of the also new GX40 Ransomware. E-mail spam, exploit kits, inadequately cautious Remote Desktop settings, and even torrent downloads all are sources of file encryptors like these threats. A robust and updated anti-malware solution can block them at their installation points, and deleting the Fake WindowsUpdater Ransomware after an attack always presents a gamble with the integrity of your files.

A filename is as much a point for deception as any other data you might glean from a download. PC users too eager to do what a file tells them to do by default always will be potentially vulnerable targets for attacks like the Fake WindowsUpdater Ransomware campaign.

Loading...