Home Malware Programs Ransomware Goofed Ransomware

Goofed Ransomware

Posted: November 15, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 14
First Seen: May 17, 2021
Last Seen: September 9, 2021
OS(es) Affected: Windows

The Goofed Ransomware is a minor variation of Hidden Tear, a Trojan whose widely-available code can be purposed for attacks to extort money and lock files. Malware experts have yet to see the Goofed Ransomware campaign as progressing into live deployment, but the Trojan remains fully capable of preventing the users from opening their files indefinitely. Always have your anti-malware programs block or uninstall the Goofed Ransomware, when they identify it and recover your locked data through backups or other, equally free solutions.

The Price of a Little Goof

A threat actor with the profile name of 'Stan' is developing a new version of the Hidden Tear Trojan, with a fledgling campaign that already includes cryptocurrency-based extortion and dedicated points of contact for negotiations over free e-mail accounts. Since Hidden Tear already includes viable features for encrypting data, the Goofed Ransomware is capable of blocking files from being usable by any victims it might attack immediately. Any other features that might see inclusion in the campaign's deployment, such as wallpaper-hijackings, remain speculative.

For its payload, malware experts are finding no sharp deviations from the standard-operating-procedure of the original Hidden Tear; the Goofed Ransomware continues to conceal its data-locking attacks behind a memory process that shows no user interface and uses an AES algorithm for encryption purposes. Users may identify all files that the Goofed Ransomware 'locks' through this method by searching for '.goofed' extensions, which appear after the original format tags, without erasing them.

The Trojan also creates a Notepad file, which it places in the same directories as any blocked data. The included message provides a Bitcoin wallet address, a 100 USD cryptocurrency ransom to 'buy' the file-unlocking solution, and an e-mail address for negotiating with the threat actor. Although many versions of Hidden Tear do include decryption functions, malware analysts advise avoiding paying for them, which can lead to cybercrooks taking the money without transferring over the decryption key for your files.

Recovering from a File-Encrypting Goof-Up

The Goofed Ransomware's attacks may, potentially, target any type of data that Stan specifies in the Trojan's internal list of formats. However, current configurations of the Trojan represent the most risk to text documents, images like GIFs, archives like ZIP or RAR, and content related to the Microsoft Office software. For enabling a fast, post-infection recovery of any lockable data, malware experts strongly recommend keeping your backups on a non-local storage drive. The Goofed Ransomware and other versions of Hidden Tear also can be compatible with the decryption tools that the security industry provides at no charge.

Threat actors attach Trojan droppers and downloaders for file-locking threats to e-mail spam frequently but also are disguising them as downloads for other media types (such as pirated movies or games). For corporate targets, Trojans like the Goofed Ransomware often are introduced into an already-compromised network that's using inadequate password protection. However, a majority of anti-malware products can identify Trojans of the Hidden Tear family traditionally and should delete the Goofed Ransomware without letting it block any of the PC's local files.

'Stan' may be hoping to turn each lapse in judgment about your PC's security into an equivalent of a hundred dollars of profits, but the Goofed Ransomware is no more or less threatening than any other divergent branch of the sprawling Hidden Tear family. As always, the best protection against the Goofed Ransomware is proactive and involves maintaining strong passwords, regular backups and relevant security software.

Loading...