Home Malware Programs Ransomware 'nautilus369alarm@gmail.com' Ransomware

'nautilus369alarm@gmail.com' Ransomware

Posted: August 22, 2018

The 'nautilus369alarm@gmail.com' Ransomware is a part of the Rotorcrypt Ransomware family of file-locking Trojans. The 'nautilus369alarm@gmail.com' Ransomware blocks your files by encrypting them and modifies their names by adding new extensions and e-mail addresses for ransom purposes. Unlike most Trojans of its kind, this threat doesn't leave a separate ransom note. Have an anti-malware program delete the 'nautilus369alarm@gmail.com' Ransomware from any infected computer before using any necessary data recovery steps for saving your files.

The Next Rotorcrypt Ransomware Update Arises from the Sea

A new build of the Rotorcrypt Ransomware, a small, but a long-running family of file-locking software, is being pointed out by cyber-security researchers as a future threat to PC users without backups. This version of the Trojan, whose negotiating address (seemingly, randomly) references a marine mollusk, is using the Google's free e-mail services and may be the product of an amateur threat actor. However, the 'nautilus369alarm@gmail.com' Ransomware, like any, non-buggy version of the Rotorcrypt Ransomware, still may harm your files permanently.

The Rotorcrypt Ransomware family uses a secure, RSA encryption feature that locks various formats of media on Windows machines, such as DOC or TXT documents, JPG or GIF pictures, archives, databases or spreadsheets. For now, the 'nautilus369alarm@gmail.com' Ransomware shows no signs of modifying its encryption routine significantly differently from that of ancestors like the 'Blacknord@tutanota.com' Ransomware, the Starbax@tutanota.com Ransomware, the Panama1@tutamail.com Ransomware, or the Patagonia92@tutanota.com Ransomware. However, it does add a new extension that includes the address in its name, additional alphanumeric symbols and the '.Alfablock' string.

One of the most signifiant attributes of the 'nautilus369alarm@gmail.com' Ransomware's family is the lack of one: these threats don't generate text messages containing ransoming instructions for unlocking your media. Instead, the promoted e-mail address serves as a point of contact for negotiations between the Trojan's admin and the victim. Malware researchers have yet to acquire hard details on the ransom amounts involved here, but most file-locking Trojans only traffic in non-refundable and anonymous currencies.

Putting a Sea Beastly Software Back Where It Belongs

The use of Gmail for an e-mail contact is the hallmark of a threat actor without much experience in file-locking Trojan operations and contrasts with the more traditional favoritism of options like Bitmessage. Whether the author of the 'nautilus369alarm@gmail.com' Ransomware variant of the Rotorcrypt Ransomware has any talent or not, however, the Trojan's method of blocking files remains impenetrable by any third parties. Defending your files against infections by most file-locking Trojans, including the 'nautilus369alarm@gmail.com' Ransomware, requires keeping additional backups on devices that aren't put at risk by individual security breaches.

Threats of this classification often benefit from e-mail-based transportation tactics that hide their installers inside of corrupted or fake documents. Delivery updates, bills, and memos from office staff are examples of some of the templates that threat actors may use during such an attack. Malware experts advise scanning all recently-downloaded files with appropriate security tools before opening them, as well as disabling potentially unsafe content, such as Word's macros or your browser's support for JavaScript. Most anti-malware applications are deleting the 'nautilus369alarm@gmail.com' Ransomware's executable safely, which pretends that it's a Windows component ('winlogon').

The Rotorcrypt Ransomware, like many of the smaller families of file-locker Trojans, is quiet, but not dead. With new versions like the 'nautilus369alarm@gmail.com' Ransomware around, the current day is never an inappropriate time for a quick backup.

Loading...