Home Malware Programs Ransomware Mr403Forbidden Ransomware

Mr403Forbidden Ransomware

Posted: July 19, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 50
First Seen: July 19, 2017
OS(es) Affected: Windows

The Mr403Forbidden Ransomware is a file-encoding Trojan based on the FTSCoder family, which some security sector organizations refer to as the 'Stupid' Ransomware. Attacks from this threat can block you from opening different types of files, alter their filenames, and create pop-ups alerting you to its demands for ransom payments. You should remove the Mr403Forbidden Ransomware with a trusted brand of anti-malware tool before recovering any damaged media through either a backup or a free decryptor, in your own time.

Seeing Error Messages in an Unusual Context

While a 403 error page is an in-browser response to some failures of loading a website data, a new team of threat actors is taking the label for illicit business ventures. Their Trojan, the Mr403Forbidden Ransomware, is an update of previous versions of the FTSCoder, a family of file-locking threats that includes the BlackSheep Ransomware, the WhyCry Ransomware, and a handful of other specimens. Their campaign seems to be targeting Indonesian systems with the by-now traditional attempt at holding data hostage to extort money.

While the Mr403Forbidden Ransomware includes some English-based components, such as its ransom notes, its authors appear to have limited fluency with the language and may be using a translation service. The infection methods the Mr403Forbidden Ransomware is using for its distribution are, as of yet, unidentifiable, but a majority of this class of attacks use spam e-mails, corrupted websites, or a combination of the two. Once it does have system access, the Mr403Forbidden Ransomware launches a file-encrypting routine meant to lock your digital content with a cipher.

The Mr403Forbidden Ransomware adds 'alosia' extensions to every file that it blocks this way, which can include various formats of text documents, compressed archives, pictures, audio, and databases or spreadsheets. It also may use an additional string that identifies the source of the encryption by name, which malware analysts note as an unusual characteristic from Trojans of this payload type.

Once it's blocking your files, the Trojan creates a Windows message box, with the included text being in English primary. Its authors ask you to contact them at one of two, free e-mail addresses for paying to unlock your data. Like most FTSCoder variants, the Mr403Forbidden Ransomware includes the decryption component with the rest of the program, which means that the threat actor only needs to provide the password.

Forbidding a Trojan Free Access to What's not Theirs

Although a regular 403 message is no more harmful than a stop sign, its employment as a con artist's alias gives the term a new context for otherwise old styles of cyber attacks. Before paying or making other, rash decisions regarding its threat actors' demands, victims should consider investigating all free recovery options, including the FTSCoder-specific decryption programs currently available. Specialized security researchers also may provide further assistance with samples of the encoded content and the Mr403Forbidden Ransomware.

FTSCoder isn't known for being evasive particularly, and malware analysts find no new features with the Mr403Forbidden Ransomware to alter that conclusion in any meaningful way. Many anti-malware products may block this threat immediately or remove the Mr403Forbidden Ransomware after an infection happens. With foresight, users also can deprive this Trojan of any leverage by dutifully backing up their content beforehand.

The Mr403Forbidden Ransomware only is just starting its attacks against Indonesian PCs and their owners. However, FTSCoder isn't a family that's shy about crossing borders, and the Mr403Forbidden Ransomware could turn into a more widespread problem for the unprepared.

Loading...