Home Malware Programs Ransomware Kostya Ransomware

Kostya Ransomware

Posted: October 11, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 91
First Seen: October 11, 2016
OS(es) Affected: Windows

The Kostya Ransomware is a data encryptor Trojan that uses its encoding attacks for extorting money from the PC's owner. Like similar threats, the Kostya Ransomware infections are recognizable by symptoms including high-visibility ransom messages and being unable to open any encoded content. If you don't use anti-malware tools to terminate or delete the Kostya Ransomware preemptively, your best recourse for data restoration is most likely in restoring from a backup, rather than paying the fee.

Seeing What's Behind the Lockdown on Your Screen

In the recent past, Trojans dedicated to ransom-based campaigns often stopped at blocking the victim's screen and demanding their fee. Modern iterations of similar threats, such as the Kostya Ransomware, almost always include other attacks, such as file encryption, which they may launch alongside or in exclusion to the previous screen-locking features. The Kostya Ransomware incorporates both techniques into its campaign, making the Trojan an immediate threat to your local data along with your essential PC usability.

The Kostya Ransomware is targeting its attacks against Czech-speaking PC owners currently, using a distribution model malware researchers still are identifying. Similar campaigns most often spread through e-mail or other spam messages, but the Kostya Ransomware also may be being installed through brute force attacks to server machines or similar exploits. After the install procedure, the Kostya Ransomware begins encrypting the contents of your C drive, excluding essential Windows directories. Victims may note that there are no symptoms of the attack as it occurs, although the Trojan doesn't target other drives besides C.

With its data encryption concluded and your data blocked, the Kostya Ransomware then launches an HTML pop-up in a borderless format for blocking the entire desktop interface. This pop-up delivers a Czech-based ransom message, including archetypal elements of such modern tactics, such as time limits before the deletion of the decryption key, interactive payment-processing fields, and recommendations on how to use anonymous currency transactions like Paysafecard.

The Discount Way of Escaping a Kostya Ransomware Attack

While the Kostya Ransomware combines different features to hold your PC and its contents hostage effectively, its attacks do include various limitations making it easier to circumvent than similar threats. Since the Kostya Ransomware doesn't target network-mapped drives, peripheral devices, or secondary hard drives, PC operators can use these sources for booting their systems through Safe Mode and avoid triggering the screen-locking pop-up. Although any encrypted content still is locked, you can use backups from the previously-noted sources for recovering your data with no need to pay the Kostya Ransomware's authors.

However, most PCs benefiting from standard anti-malware protection should block this threat before it can encode and damage any of your files. Since decryption may be impossible, malware experts also recommend keeping backups that can be reverted to whenever the original sources are beyond any hope of being repaired. Paying for a Kostya Ransomware decryptor, regardless of any imposed time restrictions, always should be avoided in all but the most extreme scenarios.

While the Kostya Ransomware may seem to render its victims all but helpless regarding system accessibility, it is just as vulnerable to previously established security measures as similar Trojans like the Petya Ransomware. PC owners who aren't treating their systems with extreme carelessness, such as by opening e-mail attachments before scanning them, are not likely of being put in a position where paying a the Kostya Ransomware fee becomes necessary.

Loading...