Ransom Prank Ransomware
Posted: August 29, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 3 |
First Seen: | August 29, 2017 |
---|---|
OS(es) Affected: | Windows |
The Ransom Prank Ransomware is a fake file-encrypting Trojan that pretends to block your media, although its only significant attack is using its pop-up to lock the GUI. Follow the instructions as provided in this article for disabling this threat and regaining control over your PC. Anti-malware solutions also may remove the Ransom Prank Ransomware automatically without it being able to superimpose itself over the Windows interface.
One Joke with a Punchline not Worth Hearing
Although it's easy enough for even the most inexperienced of programmers to borrow code for causing encryption-based file damage, some threat actors consider even that a bridge too far for walking. Along with actual, file-locking threats, malware analysts sometimes see Trojans that include the symptoms expected of just such an infection, but without the encryption. However, these Trojans, like the Ransom Prank Ransomware, still can use misinformation to try to collect money in spite of their limited payloads.
The Ransom Prank Ransomware has no encryption functions but does include a screen-blocking one. This attack displays an interactive Web page automatically, sized to the current screen resolution, and omits the border and related UI controls. The pop-up displays a typical 'ransom note' as per file-encrypting Trojan standards, including a time restriction on paying and Bitcoin-based ransom to decrypt your media. However, this message is a bluff, as malware experts can confirm no other attack features of note in the Ransom Prank Ransomware's payload.
Like most screen-locking threats, the Ransom Prank Ransomware also includes a simple password ('12345') for removing its window and restoring access to the user interface. If this password fails, paying the ransom is a solution that malware experts discourage since con artists can accept the money and refuse services without risking a refund.
Keeping Your Desktop Prank-Free
The Ransom Prank Ransomware isn't capable of causing permanent damage to your PC's files currently but does lock the entire OS from being usable superficially. Should its threat actor change the password to a less obvious one, victims will need to recover by rebooting their PCs while also disabling the Trojan's start-up process. For most users, malware experts recommend attempting a Safe Mode-based reboot by tapping F8 during the restart process to access the menu for the Advanced Boot Options. You also can use peripheral devices like USB drives to recover your computer and override any Registry exploits that the Ransom Prank Ransomware uses for loading itself.
Although malware researchers are working on determining the Ransom Prank Ransomware's distribution model, no samples available offer evidence of how it installs itself currently. Threat actors may be bundling the Trojan with other downloads, such as fake software updates or torrents. Regardless, having anti-malware products that can uninstall or delete the Ransom Prank Ransomware automatically is your most reliable protection.
The idea of a Trojan with such a simple password being a real security problem may seem laughable. However, this password is an easily-edited string, and even a few seconds of work could make the Ransom Prank Ransomware into something that's no laughing matter.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.