Home Malware Programs Ransomware Mpal Ransomware

Mpal Ransomware

Posted: May 4, 2020

The Mpal Ransomware is a file-locking Trojan that's from the STOP Ransomware Ransomware-as-a-Service. It blocks files from opening through its encryption attacks and extorts money from victims. Users can identify and delete the Mpal Ransomware safely through anti-malware services, although doing so will not restore the locked files.

The Trojan Named 'Stop' Keeps Rolling Onwards Ironically

Between major RaaS or Ransomware-as-a-Services like the Dharma Ransomware, the Scarab Ransomware, the Globe Ransomware, and the STOP Ransomware, the latter is, easily, at the top in the sheer proliferation of variants. It also is, unhappily, one of the families most prone to creating other security issues, as well as disguising its attacks while they're happening. The Mpal Ransomware is more proof of the vibrancy of that Trojan family's profitability or at least the perception of such inside the dark Web.

While the STOP Ransomware family goes back years with campaigns like the Rectot Ransomware and the Dutan Ransomware, others, such as the Alka Ransomware, the Btos Ransomware, and the Mpal Ransomware, date to 2020. The Trojan targets Windows environments, in most cases, and may compromise victims through random downloads like torrents, or use targeted phishing e-mails against businesses. Once it's inside, the Mpal Ransomware starts encrypting files, while delaying users' reactions with a fake Windows update bar.

The program denotes the encryption and blocking of files (via a secured AES algorithm) with extra filename extensions, specific to its name and campaign. Along the way, besides taking documents, pictures, and other media hostage, it destroys the Shadow Volume Copy backups and hijacks the Hosts file Web-browsing settings for blocking cyber-security sites. Lastly, malware experts occasionally see versions of the Mpal Ransomware's family dropping AZORult spyware for collecting information, although this isn't verifiable, yet, for the Mpal Ransomware campaign.

Sparing Your Work from Bitcoin Bargaining

The use of ransom notes, text messages asking for a cryptocurrency payment, and linking to a TOR site, particularly, is near-universal to file-locking Trojans' families. While paying these ransoms is the threat actor's intended goal, the Mpal Ransomware's being part of a Ransomware-as-a-Service means little for its reliability on the decryption end. Users should have backups of their work prepped on a suitably-secured device safely, even though rare infections scenarios will allow for the recovery of files through specialized software.

Malware researchers recommend avoiding IP-violating media, piracy applications, and questionable software updates from unofficial domains as sources rife with file-locking Trojan downloads. Users also should protect their computers by selecting passwords with an emphasis on anti-brute-force safety, turning RDP off, and patching software like office productivity suites. Only Windows users are at risk from the Mpal Ransomware and most other versions of the STOP Ransomware.

As threat actors remain convinced that the STOP Ransomware is the key to riches, the Mpal Ransomware is more gold leaf plating on top of the cruel reality of the file-locker Trojan industry. Victims may get nothing back for their expenses, but those who sell Trojan services to others are the real winners in this business.

Loading...