Home Malware Programs Ransomware Null Ransomware

Null Ransomware

Posted: September 4, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 25
First Seen: September 4, 2017
OS(es) Affected: Windows

The Null Ransomware (also self-named as 'Strix') is a Trojan that locks your media-related files with encryption. Symptoms of a Null Ransomware infection usually will include interactive pop-up messages asking for payment for the decoding solution, along with related changes to the names of all encrypted content. Use your anti-malware programs for removing the Null Ransomware safely and backups for keeping your files from being at risk of receiving permanent damage.

The Documentation that's not Worth Reading

Despite how well-known the strategy is, many threat actors persist in using fake text documents as their favorite infection method for Trojan distribution. These attacks sometimes incorporate real documents with fraudulent content that includes exploits, often using macros. However, other times, a Trojan will be the fake document, itself, as malware experts see with the Null Ransomware currently.

Forged email messages are the most widely anticipated means of the Null Ransomware's fraudulent PDF executable circulating, although the Null Ransomware also may be downloaded through disguised hyperlinks or even with the mostly automated, drive-by-download attacks of an exploit kit. After it tricks the victim into launching it by any of the above means, the Null Ransomware proceeds with a system scan that converts media files into encrypted versions of themselves.

The Null Ransomware uses the AES-256-based cryptography to encode files such as documents, pictures, archives or spreadsheets, among other formats. While malware experts can confirm some features of the Null Ransomware's payload being network-dependent, the Trojan also may be capable of locking files without a C&C connection. The Null Ransomware also appends '.null' extensions onto the names of every file that it blocks, which is a tag that has yet to make any appearances in other Trojan campaigns.

Nullifying a Threat to Your Financial Future

Although its immediate impact lies in the damage it causes to your locally-stored media, the Null Ransomware also attempts to extract money from its victims by selling its decryption key. Details of its ransoming instructions are dependent on external settings that a remote attacker configures through a C&C server, although early estimates are that the Trojan may ask for up to up to nearly ten thousand dollars in Bitcoins. Malware experts recommend contacting appropriate security researchers for help, if decryption is a necessity, since the AES-256 encryption, by itself, is often insufficient for preventing third parties from decoding it.

However, decryption can be impossible with some file-locking Trojans, and the Null Ransomware isn't in a finalized stage of development currently. Saving backups to locations not traditionally at risk of attack, such as a detachable USB device, will give any victims choices for data recovery that don't need to break the Null Ransomware's cipher. If you do need to uninstall the Null Ransomware, malware experts suggest rebooting into Safe Mode with a disabled network connection and scanning your PC with a dedicated anti-malware application.

While many anti-malware products are detecting the Null Ransomware as a security risk, software can't prevent a user from opening a file of their own, free will. Be sure to confirm where a document is from before trying to read it since threat actors have nothing other than widespread appreciation for the ubiquitous exploits of a fake PDF.

Related Posts

Loading...