Home Malware Programs Ransomware Gendarmerie Ransomware

Gendarmerie Ransomware

Posted: November 2, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 68
First Seen: November 2, 2017
OS(es) Affected: Windows

The Gendarmerie Ransomware is a Trojan that pretends to be part of an FBI-endorsed attack that blocks the media-related files of your computer. Like similar threats that use harmful cryptography, users can protect their work easily by backing their drives up to other devices, although malware experts also recommend testing free decryptors instead of paying a ransom. Professional anti-malware programs, such as brand ones with historical potency against Hidden Tear, are ideal for removing the Gendarmerie Ransomware without causing any further damage.

Hidden Tear Goes into Law Enforcement

Unsurprisingly, threat actors are still eager to use the free and straightforward code of Utku Sen's Hidden Tear for blocking media and demanding money after the fact. However, one recent variation on this theme, the Gendarmerie Ransomware, is including details of an old tactic to help push its extortion's success rates. Along with the traditional symptoms, such as locking files individually with encryption, the Gendarmerie Ransomware also pretends to be a product of the FBI.

The Gendarmerie Ransomware, as per its name, is targeting French speakers, although malware researchers have yet to confirm public attacks utilizing the Trojan. Its core features include the locking of files, such as documents or images, with an AES-based encoding that uses a static, hard-coded key instead of a dynamic, custom-generated one. Its name marker for all blocked media, the '.hacking' extension may be intended as a placeholder until the threat actors develop additional, thematic components for the Trojan's payload.

The Gendarmerie Ransomware also creates a Notepad file for the victim to read that includes most of this campaign's more unusual elements. While the Gendarmerie Ransomware does offer the traditional choice of paying its con artists for a file-unlocking solution, it asks for payment in Neosurf coupons instead of a typical cryptocurrency. According to our malware experts' prior investigations, these prepaid voucher-based ransoms are most common to file-locking threats operating in Europe. The Gendarmerie Ransomware's message also is notable for including fake FBI and law enforcement references, making the Trojan appear as if it's a legal, punitive tool, instead of an illicit software.

Keeping a Bad Cop Crying for Money

Although the Gendarmerie Ransomware's police tactic uses minimal, cosmetic elements and omits the previously-popular graphical support found in old types of European Trojans, it does include a real possibility of damaging your files. Since malware experts rate the chances of successful third-party solutions for the Gendarmerie Ransomware as being high, victims may want to contact trustworthy anti-malware researchers for any file-unlocking assistance they require. Having backups that can recover your files without a decryptor is ideal, although you always should attend to any ongoing security issues, such as the Gendarmerie Ransomware infections, first.

The Gendarmerie Ransomware is, like any Hidden Tear variant, a Windows-only threat that, despite its language preferences, may run and block media on PCs around the world. Trojans with similar payloads usually circulate through known methods, such as spam e-mails, and often may disguise themselves as being a non-toxic content. Anti-malware protection can help with both uninstalling the Gendarmerie Ransomware and detecting its installer before any attacks can happen.

No matter what country you're in, law enforcement will never ask for legal fees through channels like prepaid vouchers or cryptocurrencies. Hoaxes like those in the up-and-coming the Gendarmerie Ransomware campaign benefit from reflexive fear and ignorance of the law from those they attack primarily, which makes knowledge and preparation into critical defenses.

Related Posts

Loading...