Home Malware Programs Ransomware Flotera Ransomware

Flotera Ransomware

Posted: March 24, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 934
First Seen: March 27, 2017
Last Seen: July 19, 2022
OS(es) Affected: Windows

The Flotera Ransomware is a Trojan targeting Polish PC users with attacks that lock their files by encrypting them. Its symptoms include creating a ransom note that asks you to pay for unlocking your content, although most PC users should try to use alternative solutions that don't finance illicit activities. Malware experts warn that this Trojan may see manual installations, and the removal of the Flotera Ransomware always should use anti-malware products also able to catch any other threats responsible for the infection.

Open-Source Resources Opening Up Problems for Poland

Thanks to the continuing availability of GitHub-based resources for a Trojan code, new versions of the Vortex Ransomware may be just appearing over the horizon. This estimated update, the Flotera Ransomware, shows no immediate connections to the threat actors of old campaigns, but its administrators are showing some minimal signs of competence in their specialty. They're installing the Flotera Ransomware with a second threat: the RAT (Remote Access Trojan) vjw0rm, to gain a generalized level of system access. This preliminary malware is in distribution via spam e-mail under various disguises.

The Flotera Ransomware (or, when translated from Polish, the 'Fighter' Ransomware) uses the AES-256 encryption to lock your local files, including documents, pictures, spreadsheets, archives, and audio potentially. Appending the '.aes' extension to each file provides a universal 'signature' for identifying the locked data, which their associated programs can no longer read. Potentially as an artifact of its open-source origins, the Flotera Ransomware also has the unusual characteristic of generating a visible pop-up for stopping the program just before it launches its file-encoding routine. However, since malware analysts see con artists handling the Flotera Ransomware installation manually, this weakness may be of minimal benefit to the victims.

Fighting Back against Threats Interested in Your Bitcoins

The Flotera Ransomware's authors predicate their campaign on inciting untraceable, non-refundable Bitcoin payments to their wallet address. Although systems with network traffic monitoring tools may be able to retrieve the Flotera Ransomware's decryption key, others will have no easier options for recovery than restoring from a recent backup. The Flotera Ransomware's introduction to your PC also implies that con artists have remote control over it, thanks to the vjw0rm's features. You should consider strongly disconnecting from the Internet and eliminating any unnecessary contact with other devices while disinfecting the system.

The text messages and extension changes one can see in the Flotera Ransomware always display after it has finished encrypting your media. Most PC users will have no available means of decrypting their files without the code that the Flotera Ransomware's threat actors hold, which they may or may not provide after being paid. Be cautious of infection vectors these campaigns are known for abusing, such as e-mail attachments disguised to look like shipping notifications, and always use professional anti-malware products to uninstall the Flotera Ransomware and other, high-level threats from a compromised PC.

The Flotera Ransomware is fighting to give the Vortex Ransomware a second chance at making illicit earnings in Poland. Backing up your files and reading your e-mails with care can help keep its campaign from succeeding.

Loading...