Home Malware Programs Ransomware NotAHero Ransomware

NotAHero Ransomware

Posted: April 12, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 68
First Seen: April 12, 2017
OS(es) Affected: Windows

The NotAHero Ransomware is a Trojan that places your files in a password-protected ZIP archive to keep you from opening them. The Trojan attempts to sell the password for Bitcoin payments to its threat actor, although most users should try all data-restoration alternatives first. Its payload's effects have the potential to be irreversible and protecting your PC with appropriate security features and software that can detect and remove the NotAHero Ransomware before an infection is critical.

Packing Your Files Up for 'Safekeeping'

While an overwhelming majority of file-encrypting threats favor encoding every file that they attack individually, a much smaller number of them take a simpler, less thorough approach to encryption. The alternative tactic of simply moving the victim's digital possessions into an inaccessible location, such as a compressed archive, is one that malware experts sometimes see via Trojans like the 'All_Your_Documents.rar' Ransomware or the even newer the NotAHero Ransomware. Instead of using WinRAR, the NotAHero Ransomware blocks your files with a WinZip-based compression, although the final effect is identical.

The NotAHero Ransomware targets a set list of media with prerequisites based on either the locations, such as the Downloads folder, or the formats, such as PDF. Instead of encrypting each file, one at a time, the NotAHero Ransomware moves them to a newly-created ZIP archive. It locks the compressed file with a password that malware experts have deemed as being hard-coded and, therefore, static. This trait makes it more vulnerable to cracking efforts than the typically variable decryption keys that competing Trojans generate for each infection individually.

The NotAHero Ransomware also creates a second, Notepad file: the self-explanatory 'Pay me bitcoins to get all your files unlocked.txt.' It contains minimal information for the victim, besides a wallet address, after which the threat actor, supposedly, will provide the password.

Being Your PC's Hero for Hostage Files

The NotAHero Ransomware campaign doesn't date back further than April of 2917 significantly and has no currently evident relatives in the threat industry. Malware analysts still are trying to determine how its authors are distributing it. Similarly-categorized attacks can compromise your PC through a range of exploits that include:

  • A browser-based content can download the NotAHero Ransomware automatically, through the use of JavaScript, Java or Flash vulnerabilities.
  • Some threat actors target specific entities, most often small to mid-size companies, with Trojans that they attach to forged e-mail messages.
  • A minority of file-encrypting Trojans also may bundle themselves with mislabeled downloads circulating on websites or torrents, particularly ones related to pirated content.

While the NotAHero Ransomware's ZIP password isn't customized, samples of this threat are in low supply, and malware analysts and other industry researchers have not yet cracked it. For victims uninterested in the risk of paying the Bitcoin ransom, keeping regular backups and saving them to external drives or servers will offer the best protection from all file-encrypting attacks. Reliable brands of anti-malware software also may block many of the previously-noted exploits and remove the NotAHero Ransomware immediately.

It doesn't take innovation or advances in encryption technology to lock unprotected victims out of their digital possessions. In many cases, like the NotAHero Ransomware, such an attack needs nothing more to succeed than an absence of backups and one wrong click.

Loading...