RanDsomeWare Ransomware
Posted: July 27, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 1,159 |
First Seen: | July 27, 2017 |
---|---|
Last Seen: | November 6, 2021 |
OS(es) Affected: | Windows |
The RanDsomeWare Ransomware is a Trojan that blocks the user's local files by encrypting them. Although current samples of the RanDsomeWare Ransomware don't seem to be extortionist in nature, minimal updates could facilitate such attacks with this Trojan's payload. Use anti-malware programs for protecting your PC from file-encoding threats or uninstalling the RanDsomeWare Ransomware, and backups for guaranteeing that no permanent harm befalls your media.
An Encryption Problem that's Anything but Random
Even free and legal software is corruptible towards harmful and illicit acts, and PC users unsure about the safety of a program never should run it without further attempted analysis. Some of the most publicized examples of 'good' software warping into the con artists profitability are the Hidden Tear and EDA2 families, which Turkish programmer Utku Sen developed for demonstrating non-consensual encryption functions. Now, a newcomer program is showing similar predilections: the RanDsomeWare Ransomware.
Malware researchers haven't seen the RanDsomeWare Ransomware in live distribution or as part of a ransom-collecting campaign, and it seems to be made for helping PC users analyze the basics of a forced encryption solely. When the user opens it, the RanDsomeWare Ransomware displays a simple pop-up warning that forewarns about the encryption feature and recommends running only from within a Virtual Machine environment. Instead of using an exploit to bypass the Windows permissions security, the RanDsomeWare Ransomware prompts the user to grant the RanDsomeWare Ransomware admin access intentionally.
The RanDsomeWare Ransomware's encryption function, once underway, is similar to those of other file-locking threats and encodes different formats of media according to an internal cipher. The '.RDWF' extensions it appends to their names also serve as means of identifying which files will no longer open. Unlike most file-encrypting Trojans, the RanDsomeWare Ransomware doesn't include a ransom message or other means of soliciting payment for the decryption solution.
Decoding a Lesson in Trojan Programming
The RanDsomeWare Ransomware's payload also has another, important detail showing that it's not wrongful oriented: the fact that it uses a static decryption password, instead of a custom-generated one. Typing 'SUPER_SECRET_KEY' in the secondary pop-up that the Trojan loads should recover any encoded content in full. Concerning updates, secure versions of the RanDsomeWare Ransomware or similar threats, malware experts more often recommend using backups for retrieving any blocked files.
The samples of the RanDsomeWare Ransomware shown right now have limited capacity to harm any attentive PC user but do show a working encryption function. Con artists interested in exploiting its code, similarly to EDA2 or Hidden Tear, could make minor updates, remove its warning message, and modify the decryption 'key.' Due to its high potential for abuse, malware experts recommend removing the RanDsomeWare Ransomware with anti-malware services that should detect it as a threat by default.
The user who created the RanDsomeWare Ransomware may not have meant for any harmful purpose. However, when it comes to the threatening software industry, intention often runs up against a brick wall of profit-seeking motives that result in file damage for unfortunate few.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.