Home Malware Programs Ransomware MVP Ransomware

MVP Ransomware

Posted: September 11, 2018

The MVP Ransomware is a variant of the Russian-language branch of the Scarab Ransomware family. These Ransomware-as-a-Service, file-locking Trojans can encrypt and rename media automatically, compromise networks, and delete backups while they're demanding ransom money for helping you recover your data. Treat this Trojan as being a high-level threat to any PC and always have a professional anti-malware program uninstall the MVP Ransomware or quarantine it on an as-needed basis.

Hackers Turn Your Server into Their Betting Entertainment

Another variant of the Scarabey Ransomware, the Russian-based sub-division of the Scarab Ransomware's Ransomware-as-a-Service enterprise, is available in the wild, some while after malware analysts examined relatives like the Scarab-Rent Ransomware, the Scarab-Horsia Ransomware, the Scarab-Leen Ransomware, and the Scarab-Red Ransomware. Its threat actor's favorite technique for installing it is open to questioning, but, based on previous campaigns, is most exploiting e-mail or admin login vulnerabilities probably. The goal: collecting cryptocurrency ransoms after locking a network's worth of files.

Although the MVP Ransomware, and other versions of the Scarabey Ransomware, deliver warning messages in Russian, the encryption is capable of damaging PCs with most versions of Windows. The MVP Ransomware uses a variant of the AES in CBC mode for locking different file formats; although the complete list is extensive, malware experts are emphasizing the vulnerability of documents, images and work-related content. Most versions of the Scarab Ransomware family also overwrite the filenames of everything with a string of semi-random characters, and the MVP Ransomware also employs this means of concealing the identity of the 'hostages.'

The MVP Ransomware's name is from the 'mvp' extension that it adds, as well, which is a configurable value that other members of its family use with differing labels. While the threat actors are offering a decryption service for data recovery, there's no definitive information on what they're charging. In general, victims should test the decryption solutions that the PC security industry already makes available for file-locker Trojans before any consideration of paying a potentially futile ransom. The MVP Ransomware also offers 'free samples' for two files, which may be of use to some.

The 'Most Valuable Player' on Your Computer's Team

Infection strategies that malware researchers see happening with file-locker Trojans, in general, and similar threats operating by attacking network servers include the below, particularly:

  • Brute-force software can break through login credentials and, in so doing, give a remote attacker admin-level access to your PC Guard your passwords carefully and avoid using any login values that would be straightforward for black hat software to 'guess.'
  • E-mail is a secondary method by which some RaaS Trojans distribute themselves. E-mail attacks may include unsafe links or attachments, and, almost always, use disguises that are relevant to the targets. Word macros and PDF vulnerabilities are reoccurring elements particularly.

Keeping the MVP Ransomware from accessing the rest of your network should be a high priority in any infection. While malware experts can't guarantee any recover for your media, an AV vendor does provide a limited degree of decryption for the Scarab Ransomware attacks. Backing up your files to a safe place beforehand is always the ideal solution, and anti-malware programs of most brands should isolate or delete the MVP Ransomware as a high-level threat.

What may look like a game to the criminals is real money. PC users who want to deal with fewer problems like the MVP Ransomware should make backups, avoid clicking on dangerous downloads and use appropriate passwords for making it as expensive on the criminal as is possible.

Related Posts

Loading...