Home Malware Programs Ransomware Gtsc Ransomware

Gtsc Ransomware

Posted: October 9, 2020

The Gtsc Ransomware is a file-locking Trojan from the Dharma Ransomware Ransomware-as-a-Service. Users can identify infections by symptoms such as files refusing to open, 'gtsc' extensions, and advanced Web page ransom notes. Sufficiently-isolated backups are the best protection for any files, although most PC security products should remove Gtsc Ransomware upfront.

A Service is Back with Not-Quite-Randomized Trojans

Some Trojan families seem like they're taking inspiration from STOP Ransomware's essentially random character naming scheme, including one of its biggest competitors. The Gtsc Ransomware, a variant of the Dharma Ransomware, is a threat recently detected in early October, with samples showing the characteristic familial features. Arguably, the name choice makes the Gtsc Ransomware's campaign slightly more threatening, by confusing users who might mistake it for another Trojan, and one with a different data-blocking algorithm, to boot.

The Gtsc Ransomware's campaign threatens Windows systems with an AES encryption routine that it secures with RSA – for preventing third-party data recovery. The attack targets most digital media, out of which malware experts underscore documents, pictures, spreadsheets, and music as examples of lockable files that are relevant to most victims particularly. Every file also experiences an appended extension, unique to each variant, such as Gtsc Ransomware's 'gtsc' string, the threat actor's e-mail and an ID.

The apparently-arbitrary naming convention shows more meaning when victims look at the unique e-mail of 'getscoin3.' The reference lets even otherwise-ignorant victims in on the Trojan's campaign demands: Bitcoin cryptocurrency, in exchange for providing the file-recovering decryption service. Although our malware experts urge against paying, free decryption for the Dharma Ransomware family is rare and unavailable usually.

Details Hiding Beneath Arbitrary Characters in Trojan Campaigns

The Gtsc Ransomware is capable of some less-than-obvious attacks that can endanger users' data, besides the straightforward encryption routine. It is briefly using a living-off-the-land strategy for wiping the Restore Points by commands through the Windows Command Prompt. The program also can terminate some processes (associated with security, media, or network management software) automatically. Since encryption attacks usually take minimal time for completion, users who don't block Gtsc Ransomware with security products immediately will likely find their local data compromised thoroughly.

A backup on another system or storage device is the most universally-appropriate solution to the Gtsc Ransomware attacks and those of other file-locker trojans. This family includes too many members for recounting in a single article. However, relevant examples might comprise the equally-new AHP Ransomware, the Lina Ransomware, the FLYU Ransomware or the old 'sebekgrime@tutanota.com' Ransomware. These threats' campaigns can circulate through e-mail lures and fake documents, torrents, Exploit Kits and other means.

Admins should maintain careful database backups, version control, and password management for reducing the damage and chances of an attack. Trustworthy anti-malware products are capable of detecting and deleting Gtsc Ransomware or most other Dharma Ransomware versions accurately.

E-mails and extension names make up most of what the Gtsc Ransomware brings to the table, besides the poisonous features that the family heritage grants it. Such encryption attacks, while well-known, are far from timid, and Windows users not protecting their data will find out more quickly than they'd like.

Loading...