Home Malware Programs Ransomware Naampa Ransomware

Naampa Ransomware

Posted: July 19, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 53
First Seen: July 19, 2017
OS(es) Affected: Windows

The Naampa Ransomware is a Trojan that locks your files to force you to pay for recovering them. Free decryption software and previous backups are two options victims can use for data retrieval instead of paying the threat actor (who may not honor the agreement). Numerous brands of anti-malware products may identify this threat and, therefore, delete the Naampa Ransomware before it launches an attack or after one occurs.

Russia Gets Renewed Attention from File-Snatching Extortionists

As a consequence of its law enforcement's stance on related investigations, the nature of Russia in the cyber-crime industry is a somewhat remarkable one. However, while it remains unusual, Russia no longer is a safe zone for PC owners hoping that seasoned threat actors will be limiting their misdeeds to other targets. The long-term evidence of this change in the Trojan industry is highly visible with the small family of the Unlock92 Ransomware, of which malware experts are just finding a new member: the Naampa Ransomware.

The Naampa Ransomware still will use the semi-rare choice of RSA-2048 as its cipher for encrypting the files of any victims, with a double-layered generation of custom keys guaranteeing the data blockade's protection. Data that the Naampa Ransomware may block this way can include text documents, archives, images, Web pages, audio, and other media content, particularly types related to the Microsoft software. It also appends '.crptd' to their names, which is a new extension for the Trojan's family.

The threat actors using the Naampa Ransomware's payload as collateral are delivering their demands via a JPG file, instead of a text-based format. The picture instructs the victim to contact their e-mail address for assistance, along with transferring the custom file that the Naampa Ransomware uses as a holder for one of the two keys (the other of which the Trojan transmits to the threat actors).

Ending a Short Lineage of Russian Data Saboteurs

Although the Naampa Ransomware's definitive identification comes from the middle of July, members of the Unlock92 Ransomware family go back to the previous year, at a minimum. Based on the geographical preferences of its ransoming methods, malware analysts recommend that PC users anticipate infection methods using content with the Cyrillic alphabet. However, its authors also could install the Trojan without any consent after getting system access by cracking the login credentials. Using stronger passwords can mitigate, if not entirely remove, such dangers significantly.

While backing up content is a strong defense against file-encoding threats, malware experts don't recommend relying on local backups exclusively. The Naampa Ransomware deletes the Shadow Copy-based data that Windows could revert to by default, which erases the chance of getting the files back without external copies. Always save your files to another server or a peripheral device, when possible.

Different brands of anti-malware products are capable of identifying the Naampa Ransomware and other members of the Unlock92 Ransomware's group. Use these programs to protect your PC by scanning any new files and monitoring both potential, corrupted website contact and exposure to embedded drive-by-download exploits such as a document's macro. For most users, updated anti-malware protection can guarantee that they delete the Naampa Ransomware as soon as it's detected.

Although different lands are prone to different, natural disasters, there's no living space with computers with freedom from attacks like the Naampa Ransomware's hostage-taking tactics. Non-consensual encryption is an attack without borders, although, sometimes, it may prefer one language over another.

Loading...