Home Malware Programs Ransomware Leto Ransomware

Leto Ransomware

Posted: October 16, 2019

The Leto Ransomware is a file-locking Trojan that encrypts digital media to prevent it from opening. Although its motive is facilitating a ransom for the unlocker, it also may cause other symptoms, including blocking websites or installing spyware. You should let your anti-malware program of preference remove the Leto Ransomware and depend on backups for file recovery.

The Database Software with Cryptographic Secrets

While Ransomware-as-a-Service is an industry that's prone to numerous updates, forks, and brand changes, each new iteration of a past Trojan carries with it clues on infection strategies and demographic targeting. Criminals hiring these RaaS families, typically, through paying a cryptocurrency or other fee for several months of operations, sometimes, have significant preferences in these details. For instance, the Leto Ransomware, part of the STOP Ransomware, is pretending that it's database software.

The Leto Ransomware's hiding as an 'SQL Reader' program makes it most relevant to programmers, website admins, and other users who have interests in the SQL data-management language. The Windows Trojan, in other elements, is similar to its kindred in the STOP Ransomwa family, a la Bora Ransomware, Domn Ransomware, Hese Ransomware, Masodas Ransomware or Prandel Ransomware. It searches for digital media (documents and pictures are especially vulnerable, for example) and blocks them by encrypting them with RSA-protected AES.

Besides a different choice of infection method (other versions of the family often prefer torrents or direct RDP-based hacking), the Leto Ransomware also is one of the newest release versions. While malware researchers aren't linking any distinct payload upgrades to its version of 0172, it may be taking advantage of code obfuscation, changes in its cryptography, or other, unseen improvements. For now, users are advised to treat it as equally harmful as every other variant of the STOP Ransomware.

What You may Overlook While You're Staring at Unopened Files

The locking of files and collecting ransoms with the help of its text ransom message is the Leto Ransomware's raison d'etre, but the STOP Ransomware family includes support for other features. Security issues that malware researchers recommend assuming are possible during the Leto Ransomware infections include all of the below:

  • The Leto Ransomware may edit the Hosts file for blocking websites related to PC security.
  • The Leto Ransomware may download other threats, particularly, password-collecting spyware like AZORult.
  • The Leto Ransomware also deletes standard Windows backups through CMD commands, locking the user out of recovering their media quickly.

Although the Leto Ransomware has no backdoor features enabling control over the computer, via related spyware, an attacker may compromise additional, network-connected devices. For safety, victims should terminate all network connections and avoid sharing devices until they can remove the Leto Ransomware with an appropriate security program.
Website maintainers and users who can't afford to lose their databases are some of the Leto Ransomware's estimated targets, but unwanted encryption is a problem for everyone without a backup. Saving your files to another place isn't just smart; it's an insurance policy against extortion.

Related Posts

Loading...