Home Malware Programs Ransomware Nemesis Ransomware

Nemesis Ransomware

Posted: January 10, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 26
First Seen: January 10, 2017
Last Seen: April 22, 2020
OS(es) Affected: Windows

The Nemesis Ransomware is a Trojan that uses encryption to block your files, after which it deposits a message instructing you to pay for their restoration. Due to the uncertainty of being able to purchase a real decryptor, keeping backups in secure locations is an essential defense against threats of this type. Update your anti-malware products and use them to scan all incoming files to detect and delete the Nemesis Ransomware before it infects your PC.

Your Files Have a New Nemesis

For the most part, the threat market is under domination by extended families of threats rented to con artists who tailor their details to their personal preferences. However, independent projects also are an important part of any threat database, with the Nemesis Ransomware serving as the latest example so far. Malware experts have yet to associate this Trojan with any single family, but the first and foremost impact remains to lock your files, possibly irrevocably, by way of an encryption algorithm.

The Nemesis Ransomware's campaign seems to be targeting small and medium-sized business entities with financially valuable data. These attacks most often abuse e-mail-based infection vectors, although direct hacks of password-protected accounts aren't unknown. When it does infect the target PC, the Nemesis Ransomware conducts attacks as follows:

  • The Nemesis Ransomware encrypts any media, based on format and location, with an unknown algorithm. AES-256 is the most popular choice among threat actors currently, due to its efficiency and security. Once encrypted, your files can't open until after you re-interpret the rearranged file data through a decryptor.
  • The Nemesis Ransomware also modifies the names of the prior data by inserting the '.v8dp' extension. This extension does bear a superficial resemblance to some versions of the Cerber Ransomware, although malware experts can't confirm any tangible connection.
  • The last function creates a local Web page file that hosts the Nemesis Ransomware's ransoming instructions. The threat actors, so far, are refusing to provide their ransom costs upfront. Negotiations by past victims have placed the ransom demands at 10 Bitcoins (over nine thousand USD), an exceptionally high price.

Paying the Proper Price to Put an Enemy Down

Paying con artists ransom money in return for their help often comes with drawbacks, such as their unwillingness or inability to provide real solutions to the problems they cause. Since samples of the Nemesis Ransomware are in limited supply currently, interested parties should consider submitting relevant files to receptive cyber security researchers and companies. Even if a free decryptor never becomes available, paying a fine to the Nemesis Ransomware's administrators always should be a last resort option, if you consider it at all.

Most potential damages by the Nemesis Ransomware are preventable through PC users applying robust backup strategies, such as preserving duplicates of their digital content on detached devices or cloud servers. Your anti-malware protection also may be able to identify and delete the Nemesis Ransomware, or installers for it, when you receive them through e-mail spam or website exploit kit attacks.

A crowded marketplace doesn't mean that all threats are becoming equally cheap for their victims necessarily. The Nemesis Ransomware dares to ask a high price from its victims, but for sufficiently valuable files, possibly no ransom is too high as to be inappropriate.

Related Posts

Loading...