Home Malware Programs Ransomware Katyusha Ransomware

Katyusha Ransomware

Posted: October 17, 2018

The Katyusha Ransomware is a file-locking Trojan that keeps your digital media from opening by encrypting it and holds it for ransom by offering a premium decryption service. This threat also may terminate other programs without your consent, launch itself when Windows starts, and run its attacks without loading a visible window or UI. However, most anti-malware applications can delete the Katyusha Ransomware safely, after which, you should retrieve your files from their latest backups.

The Next Explosive that's Aimed at Your Media

A file-locking Trojan whose name references either a rocket launcher or a Russian folk song (or both) is just becoming detectable in AV databases. The Katyusha Ransomware's chief feature is locking files and creating messages demanding money for unlocking them, but its payload also provides several, supporting attacks. Although it's similar to some file-locking Trojans from past campaigns, malware experts conclude that the Katyusha Ransomware is unrelated to Hidden Tear, the Globe Ransomware or any other threats of note.

The Katyusha Ransomware is a Windows application that uses a combination of Registry exploits and startup tasks for accomplishing most of its goals. Besides locking files, using an encryption algorithm that malware experts have yet to identify, the Katyusha Ransomware also adds its 'katyusha' extension to their names without changing the rest of the filename. Pictures, such as JPGs, documents, spreadsheets, and other media are the traditional targets.

Some other traits that the Katyusha Ransomware shows in these early stages include:

  • The Katyusha Ransomware may enter into hibernation or sleep mode, possibly, for avoiding AV detection or analysis.
  • The Katyusha Ransomware may close the memory processes of other applications, such as SQL server programs and Windows content related to Shadow Volume Copies and default backups. Besides guaranteeing access to any files for locking, the Katyusha Ransomware may be terminating these programs so that it can delete any backups that would help with recovering them.
  • The Katyusha Ransomware launches a series of ransom notes whenever the PC reboots. These text messages provide ransoming demands for 'buying' a decryptor, along with offering a free sample and giving a time limit. The author claims that he'll give any unransomed content to the public, but malware experts see no features in the Katyusha Ransomware related to uploading encrypted files or other, confidential information to a C&C server.

Turning a Folk Melody into Something Sweet

The thirties-era song that the Katyusha Ransomware uses for its name may indicate the threat actor's plans of attacking Russian residents. However, file-locker Trojans like the Katyusha Ransomware are thriving 'business' endeavors for criminals globally. Additionally, malware experts have yet to confirm any cases of the Katyusha Ransomware self-terminating without locking files for Windows PCs in other nations, whether such behavior would base itself off of the system's language settings or an IP address.

Even though the Katyusha Ransomware doesn't include the infamous, file-deleting features of the Jigsaw Ransomware family that wiped additional data upon each reboot, users should avoid restarting their computers without any extra security precautions. Having anti-malware programs accessible for deleting the Katyusha Ransomware from Safe Mode, particularly, will keep any further encryption attacks from locking files. Backups are the only provable restoration solution for any media that the Trojan has succeeded in blocking.

The visible details of the Katyusha Ransomware infections are less substantial than many of its features that malware experts confirm for happening in the background. Going by eye for a file-locking Trojan is threatening, not just for your files, but for the safety of your PC as a whole.

Loading...