Home Malware Programs Ransomware Pezi Ransomware

Pezi Ransomware

Posted: May 28, 2020

The Pezi Ransomware is a file-locking Trojan that's part of STOP Ransomware's family. The Pezi Ransomware can keep media on your PC from opening by encrypting it, and conduct other, assorted attacks, such as removing backups. Users should back their work up to separate devices for maximized safety and let their anti-malware products remove the Pezi Ransomware as they detect it.

Trojan Service Keeps Giving until the Ransoms Run Out

Head-to-head in rented-out variations to the equally-huge Dharma Ransomware family, the STOP Ransomware is a file-locking Trojan family that's been running hot for years. With a business model that offsets the distribution of Trojans to other threat actors, this Ransomware-as-a-Service is earning its place in Trojan history while collecting ransoms. The Pezi Ransomware is another point in its favor of money collection, or at least, the perception of it.

Variants of this Ransomware-as-a-Service are extraordinarily numerous and, like the Pezi Ransomware, tend to follow a random-four-character naming format. Another characteristic that's truer of new samples of the STOP Ransomware is the use of fake TMP extensions for disguising the Trojan's executable as being a 'temporary' Windows file. The Pezi Ransomware also includes this technique, although malware researchers see multiple, random filenames that accompany the static TMP extension.

After its installation routine, the Pezi Ransomware searches for digital media that it can encrypt. This Trojan family targets digital media, including various documents, pictures, music, archives and similar content. The encryption of each file (secured with either a dynamic, network-downloaded key or a static, internal one) prevents them from opening. It also gives the Trojan its leverage for demanding payments in its ransom note.

Extricating Your Files from High-Priced Problems

The locking of files, potentially permanently, is the headline that dominates reports of the Ransomware-as-a-Service industry. Unfortunately, the Pezi Ransomware's family also offers additional issues, which malware experts verify through samples like the Btos Ransomware, the Lalo Ransomware, the Npsg Ransomware, or the Rezm Ransomware consistently. Most of the Pezi Ransomware infections will erase the Windows Restore Points as part of their data hostage-taking procedure completely. They also may:

  • Display Windows update UIs as distractions
  • Stop sites from loading by editing the Hosts file
  • Collect credentials with the help of a third-party tool, AZORult

Besides these risks, users also are likely to be incapable of restoring any files that the Trojan locks. Encryption errors in this family are relatively rare. Some users may decrypt their files in unusual circumstances, such as if the Pezi Ransomware can't connect to its Command & Control server. Non-local, password-secured backups are a highly-effective step for countering this threat, and most other Trojans like it.

Dedicated anti-malware products may, at least, remove the Pezi Ransomware on sight. Some sandboxes or virtual environments also may thwart its installation indirectly due to anti-analysis defenses.

There can't be an end to Trojans like the Pezi Ransomware without also ending their way of doing business. For doing so, no one needs to do more than making a backup and protecting it – and their computers – with natural, long-confirmed security practices.

Loading...