Home Malware Programs Ransomware Fuacked Ransomware

Fuacked Ransomware

Posted: July 18, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 9
First Seen: July 18, 2017
Last Seen: March 6, 2020
OS(es) Affected: Windows

The Fuacked Ransomware is a Trojan that uses encryption to encipher and lock your files. Its author didn't design the Fuacked Ransomware for live distribution, but a copy of this program still been capable of damaging the PC's media. Backing up your files can keep them from coming to harm by way of similar attacks and most anti-malware products should remove the Fuacked Ransomware without any difficulties.

A Trojan that's neither Living nor Dead

In cyber-security, a 'zombie' is a term often used for referring to an infected PC that's a forced conscript into a botnet that subverts its resources for committing various harmful and illicit activities. However, malware experts sometimes find other undead-styled threats, such as the Fuacked Ransomware. This Trojan is one of a multitude not intended for distribution, and, therefore, not 'live,' but retains a potential for conducting a damaging payload.

The primary concern behind 'unauthorized' releases of the Fuacked Ransomware lies with its encryption feature. This function scans for file formats that can include documents, pictures, archives and various other media. Then, it enciphers them using an algorithm malware experts are still determining, although the AES-128 is an especially favorite choice. The Trojan doesn't overwrite the names of anything it locks, add extensions to them, or change the wallpaper, all of which are omissions that help differentiate it from similar Trojans meant for extortion purposes.

Either for the developer's amusement or function reporting, the Fuacked Ransomware does generate multiple pop-ups afterward. These windows include notifications for bypassing the Windows UAC protocols and a console showing a text alerting the victim to the attack (and the need for a decryption key) successfully. Unlike most threats, malware experts are verifying that the Fuacked Ransomware doesn't appear to demand money. However, its authors do ask the victims to contact them over e-mail, which could result in the traditional negotiations ensuing.

Putting a Hibernating Threat to a Permanent Rest

The feasibility of using free decryption software to decode any content that the Fuacked Ransomware locks remain an avenue worth investigating, but malware researchers recommend using additional methods for saving any data beforehand. Many file-encrypting threats have imperfect access to protected cloud storage, and backups saved to peripherals left unattached always should be safe. Decryption without acquiring the threat actor's key isn't always a practical solution and depending on its access does little more than guarantee that threat actors can continue collecting ransoms.

The Fuacked Ransomware doesn't seem to be attacking either the public or targeted entities, like for-profit companies. However, threat actors often hijack the code of others' projects (such as Hidden Tear and EDA2) for personal reasons. Standardized security software and features can help a possible victim block attacks by many of the traditional means of infection, such as e-mail spam, disguised Web links, exploit kits and software bundles. Always use an appropriate anti-malware product for deleting the Fuacked Ransomware or, at a minimum, isolating it to stop any recurring encryption attacks.

The Fuacked Ransomware and its authors are new names to the Trojan industry but protecting a PC's files use the old security standards of prior years appropriately. The value of a responsible backup and safe Web-browsing behavior continue to climb with every release of a new threat like the Fuacked Ransomware.

Loading...