Home Malware Programs Ransomware R3f5s Ransomware

R3f5s Ransomware

Posted: June 18, 2020

The R3f5s Ransomware is a file-locker Trojan from the Dharma Ransomware family. Due to changes in attackers in the Ransomware-as-a-Service, its infection exploits may differ. Still, symptoms of infections are consistent, including having files become non-openable as a result of encryption. Users should maintain their backups for recovering any blocked media strictly and have updated anti-malware programs for deleting the R3f5s Ransomware.

Ransoms While Remaining Anonymous

Ransomware-as-a-Services are a long-established industry unto themselves, even if they're an illicit one. With consistent business practices that aren't always helpful for victims, their symptoms let users determine the scope of the problem and pay the ransom quickly, but not necessarily getting their files back to full health. However, some details are thoroughly hidden, as the R3f5s Ransomware from the Dharma Ransomware RaaS still shows.

The R3f5s Ransomware may target unprotected business environments or random PC users, with harmful effects on the files of both victim types similarly. The family uses secured AES encryption as a way of 'locking' files, such as Word or Adobe PDF documents, GIF and BMP pictures, archives, spreadsheets and more. The R3f5s Ransomware's name becomes a filename insert as both an e-mail and a fake 'extension.'

The ransoming portion of the R3f5s Ransomware's payload involves two formats of ransom notes: a pop-up and a text file. Embedded links for victims direct to a ransoming service for buying the criminal decryptor for file recovery. The use of the TOR browser is one of Dharma Ransomware's specific quirks that show how threat actors, even in recent campaigns like the R3f5s Ransomware's attacks, place a high value on their privacy and evading law enforcement.

Running Out on a Ransomware Check

Well-established Ransomware-as-a-Services like the R3f5s Ransomware's Dharma Ransomware will delete the Restore Points. This attack is a consistent occurrence in different campaigns, like those of the HCK Ransomware, the GTF Ransomware, the Php Ransomware, and the old Dharma-Gate Ransomware. Since it prevents users from recovering their files from local backups quickly, non-local ones are the best possibility for most victims – besides ransoming the 'official' decryptor.

However, malware researchers can recommend different means of protecting files and avoiding infections. Users can always save their work onto backups elsewhere, such as a removable USB. They also can reduce infection risks by deactivating macros, Flash, Java, and JavaScript, as well as installing software patches. The responsible use of password protection, RDP features, and download resources will further cut one's chances of exposure to a minimum.

Updated and trustworthy anti-malware programs can play a last-resort defense by flagging and quarantining Dharma Ransomware's variants.

Another helping of extortion for Windows computers isn't something that anyone needs to see. But as long as files are at risk, users should think twice about paying ransoms and lengthening the lifespan of the R3f5s Ransomware's business model.

Loading...