Home Malware Programs Ransomware Honor Ransomware

Honor Ransomware

Posted: February 9, 2018

The Honor Ransomware is a Trojan that blocks your PC's media by encrypting it, which the cybercrooks often utilize as leverage for demanding payments for their unlocking help. Cybercrooks-provided decryption tools can include defects or be hoaxes, and malware experts don't encourage paying for them unless you've exhausted other possibilities, such as backups and freeware decryptors. Remove the Honor Ransomware with an appropriate anti-malware product as soon as possible to keep your files safe from its encryption-based damage.

One Trojan's Idea of Honor

The Trojan-building kit of the My Little Ransomware is, once again, in use for generating custom variants of file-locking threats that the con artists could distribute for the sake of collecting ransom money. Although this family, including members like the 1337Locker Ransomware, the LanRan Ransomware and, the M0on Ransomware, is years old, the Honor Ransomware is the first verifiable member of 2018. The Trojan appears to be in mid-development, and its threat actors have yet to add traditional features like ransom messages, pop-up, or changes to the Windows wallpaper.

The test samples of the Honor Ransomware do, however, include an encryption attack that can block files such as PDF documents, JPG images, and XLS spreadsheets, among other media types. While doing so, the Honor Ransomware also replaces the original names with random alphanumeric characters and adds an extension ('.honor!'). Malware experts are confirming that the Honor Ransomware still uses the conventional method of the AES and RSA encryptions, which secures the locked files against any simple decryption attempts.

When its authors finish it, the Honor Ransomware, probably, will generate ransom-themed messages for selling its file-unlocking solution. Any victims should be cautious over ransom methods using difficult or impossible to refund payment options particularly, including voucher cards and cryptocurrencies like Bitcoin.

Dishonoring a Cybercrook's Lazy Attempt at Capturing Media

Barring the discovery of flaws in the Honor Ransomware's finalized cryptography mechanisms, the direct and free decryption of any files that it attacks may be impossible. Since the dual AES and RSA encryptions is very prominent among file-locking threats, malware experts often endorse using backups for counteracting all infections of this classification. Secure storage protocols, such as detaching your backup device while browsing the Internet, can lower the Honor Ransomware's odds of attacking the last copies of your files.

All versions of the Honor Ransomware that was analyzable are, so far, incomplete and show no clues of how its author intends to distribute them. Different media-ransoming campaigns may use different methods, although spam e-mails are, currently, one of the most popular tactics. PC users should assume that the Honor Ransomware's installer will disguise itself as a legitimate file, such as a free download, or embed its drive-by-download exploits in files like corrupted PDF documents. Anti-malware products can block these non-consensual installation attempts, as well as remove the Honor Ransomware securely.

My Little Ransomware (or the First Ransomware) is just one spawning point for an array of threats without many differences from the youngest Honor Ransomware. Since it's not hard, these days, to make a Trojan, PC owners of all walks of life will want to take just as much advantage of all similarly user-friendly backup solutions.

Loading...