Home Malware Programs Ransomware mr.yoba@aol.com Ransomware

mr.yoba@aol.com Ransomware

Posted: August 12, 2019

The mr.yoba@aol.com Ransomware is a file-locking Trojan and variant of the previous Relock Ransomware. Infections may stop media files from opening or leave ransom messages in text or advanced Web page formats. Users should have backups for their files' safety and anti-malware services for uninstalling the mr.yoba@aol.com Ransomware or blocking it, as is appropriate.

Mister Yoba Comes Calling for Your Files

The Relock Ransomware family is creating a new source of file endangerment for Windows users. However, while the mr.yoba@aol.com Ransomware is more than capable of locking your content, it's not necessarily as adept at preventing its retrieval. Users should doublecheck with other sources before paying any ransoms – although malware experts recommend keeping backups, in any case.

The file-locking Trojan, Relock Ransomware, is years old, and even more so if one counts its ancestor, the AES-Matrix Ransomware. Its attacks can block media such as pictures or documents, append extensions to them, and drop ransom notes. One of the first changes that malware experts confirm in the mr.yoba@aol.com Ransomware is a change in the note's format, from RTF to TXT and HTA. As usual, the Trojan claims that paying the ransom is the only way of recovering your work.

However, the mr.yoba@aol.com Ransomware advertises its encryption algorithms falsely. The real attack uses XOR and may be breakable by the Relock Ransomware decryptors or the efforts of cryptography-familiar cyber-security specialists. Paying the ransom blindly is, therefore, the worst thing one can do, since it gives up money for a resolvable problem and doesn't guarantee a solution for the cost.

The Cheap Fix to Replays of Trojan Lockdowns

For Trojans, weaponizing false information isn't uncommon. For instance, earlier attacks from the '.kali File Extension' Ransomware and the Cyclone Ransomware assert that their encryption is military-grade. For most file-locking Trojans, basic, secure AES and RSA encryption algorithms are, however, sufficient for blocking media semi-permanently. Victims of the mr.yoba@aol.com Ransomware's campaign should be thankful that it limits itself to XOR.

Some members of the cyber-security community support decryption efforts for various Trojans with payloads like the mr.yoba@aol.com Ransomware's attacks. Despite this last resort solution, encryption from a competent threat actor or a widely-used RaaS (such as the Scarab Ransomware) is, nearly always, non-decryptable for free. Users should prepare backups of their work while keeping this fact in mind and save their files' copies to an appropriately-secured device.

Anti-malware programs don't struggle at identifying or removing file-locking Trojans traditionally, including the Relock Ransomware family. Users should delete the mr.yoba@aol.com Ransomware through suitable software before testing any recovery options at their preference.

The mr.yoba@aol.com Ransomware's change in formatting may not make its lies hold any water, but not every victim will stop to question a threatening program. Trojans traffic in lies as much as in Bitcoins and information, which everyone shouldn't fail to remember.

Loading...