Home Malware Programs Ransomware Ogre Ransomware

Ogre Ransomware

Posted: June 8, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 29
First Seen: June 8, 2017
OS(es) Affected: Windows


The Ogre Ransomware is a Trojan that may block you from opening files, such as pictures, documents, or spreadsheets, and displays a screen-blocking ransom note. Follow this article's recommendations on regaining access to your PC's interface, if necessary, and avoid paying the ransom whenever other recovery choices (such as a backup restoration) are available. When active, your anti-malware software should delete the Ogre Ransomware automatically.

A Big, Fat Monster of a File Problem

Just like the most critical security flaw in a PC, often, is the person at the keyboard, the user also is the most exploitable element for any Trojan that uses social engineering-based attacks. Many threat actors adapt to this situation by creating the psychological manipulating features of their Trojans, such as the latest the Ogre Ransomware, before bothering with the rest of the payload. In some cases, the Trojan never may accomplish any other functions, besides tricking the victim into paying ransoms.

While the Ogre Ransomware is in development, malware experts find no code recycled that would show evidence of a previous relationship to projects like Hidden Tear or the Crysis Ransomware significantly. Its author, Laure, has built a 'lock-screen' feature for collecting ransoms, but the encryption that the message references doesn't appear to be functional, yet. However, the Ogre Ransomware does block the Windows interface, making it a potential security problem, even if its updates stop at this point.

The Ogre Ransomware scans for files of indeterminate formats and locations, with documents, pictures, archives, and audio as some of the most likely targets. Since the Ogre Ransomware does include a name-editing feature to add the '.ogre' extensions to this media, it appears likely that Laure intends to block the files with an encryption algorithm, such as AES-256. Its capping symptom is the Web page it launches in a window without a border or interface controls, delivering a warning to pay twenty Euros in Bitcoins to restore the affected files.

Turning Ogres into Midgets

Depending on how its author chooses to implement the encryption routine, any files that the Ogre Ransomware blocks may be recoverable for free or be damaged permanently. Any victims with digital content they can't afford to have erased should use remote backups to preserve them from file-encrypting threats of all kinds. Although the Ogre Ransomware does include ease-of-use features for persuading a ransom out of any users it attacks, paying isn't guaranteed to help you get a decryptor. Malware experts recommend against paying through Bitcoins and other methods that the con artists can accept without a risk of a refund for non-service particularly.

Threat actors are installing Trojans like the Ogre Ransomware through e-mail attachments, compromised websites, and other methods that rely on a user's error. Disable scripts and macros that are potentially unsafe, and scan new files before you open them to detect and delete the Ogre Ransomware before it attacks. European regions may be at greater risk from this campaign, but harmful
file encryption is a global phenomenon.

Whether Laure upgrades it into being a giant or it remains nothing more than a screen-locking Trojan, the Ogre Ransomware represents how pure greed can deprive you of both your files and the rest of your computer. Underestimating how little it takes to create an extortion-based Trojan is a quick way to find yourself at the wrong end of a ransom.

Related Posts

Loading...