Home Malware Programs Ransomware Haters Ransomware

Haters Ransomware

Posted: May 12, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 59
First Seen: May 12, 2017
OS(es) Affected: Windows

The Haters Ransomware is a variant of FTSCoder, a Trojan that can encrypt your files and display messages that may ask you for ransom money to decrypt them. Free data recovery solutions always are emphasized during attacks of this type, which seek to damage your local media in ways that the threat actors may not reverse necessarily even when you pay them. When possible, use anti-malware products for blocking and deleting the Haters Ransomware before it starts to encrypt any content.

Trojans Pretending to be More than They Are

While some forms of cyber warfare benefit from publicity, not everyone has the talent to create Trojans that get many headlines. Those without the skill sometimes borrow the brands of other campaigns, as readers can see with the Haters Ransomware's appropriation of the Cerber3 Ransomware label. Since the two Trojans aren't related, victims could choose the wrong recovery options and cause even more damage to their files than the Haters Ransomware does originally.

The Haters Ransomware is part of the latest wave of .NET Framework Trojans with a payload highly similar to the FuckTheSystem Ransomware. Although still in development, the Haters Ransomware's payload does include some functional attacks, such as:

  • The Haters Ransomware uses an encryption algorithm for blocking files that can include documents, pictures, spreadsheets or archives. The Trojan gives every file that it encodes an additional '.haters' extension for the victim to identify them.
  • The Trojan also generates a Windows dialog box that may, in the future, display ransom notes, such as requests for Bitcoin transfers. A simple, password-based decryption feature also is present in the same pop-up.

Using the appropriate decryption solution is critical to restoring the blocked files. Since much of the Haters Ransomware's default file data makes references to the third major version of the Cerber Ransomware, anyone trying free decryptor solutions may use the wrong application and destroy their media.

Working Through a Mislabeled Trojan's Hate

Unlike the family of file-encrypting threats whose name it misappropriates, the Haters Ransomware has a variety of vulnerabilities that malware experts can point out for the sake of recovering blocked content. Victims can use free decryption solutions already being hosted by other cybersecurity companies for decoding their files or the hard-coded password of 'Masihmaubullyguaanjeng' to force the Trojan to unlock them. Because future releases might change this password or the encryption method, PC users also should consider having backups that provide further protection against its attacks.

The Haters Ransomware campaign isn't in its public deployment stage, and the possibility remains that its authors may never distribute it. If they do so, the infection vectors most likely of being used include forged e-mail messages and corrupted website scripts that can load drive-by-download exploits. Good Web-browsing habits and anti-malware protection can block many elements of these attacks and have a high chance of removing the Haters Ransomware before it starts encrypting any of your files.

The phenomenon of threat authors giving wrong intelligence to the people they're attacking is unlikely to go away soon. Anyone not taking the precautions to stop a Trojan infection in the first place will need to pay attention to how they remove threats like the Haters Ransomware, lest further problems occur.

Loading...