Home Malware Programs Ransomware 'raphaeldupon@aol.com' Ransomware

'raphaeldupon@aol.com' Ransomware

Posted: April 16, 2019

The 'raphaeldupon@aol.com' Ransomware is a file-locking Trojan of an unknown family that can block media like documents, images, or spreadsheets, and leaves behind messages demanding a ransom for an unlocking service. Because many file-locking Trojans aren't decryptable by freeware, malware experts recommend keeping backups of your work secure at all times. Most anti-malware products should, however, block or uninstall the 'raphaeldupon@aol.com' Ransomware when it's appropriate.

Trojans Putting What They Want Right in Your Files' Names

A file-locking Trojan without a verifiable family may be attacking Windows users and includes most of the features of an archetypal threat of its type. The 'raphaeldupon@aol.com' Ransomware is still under investigation for any connections to past Trojans or ongoing black hat businesses but shows a significant resemblance to Ransomware-as-a-Service groups, which include the Crysis Ransomware, the Globe Ransomware, and dozens of others. It runs attacks that block the user's media by targeting any formats of value and encrypts them, which sets up its bargaining power for the ransom.

While malware researchers are narrowing down the 'raphaeldupon@aol.com' Ransomware's encryption possibilities, most file-locking Trojans use a quick-and-easy version of AES for locking files and backs it up with the security of RSA cryptography. The 'raphaeldupon@aol.com' Ransomware adds 'btc' extensions onto their names, which, besides being a symptom that it shares with old Trojans (such as the btc@fros.cc Ransomware), also is an abbreviation for the Bitcoin cryptocurrency. This resemblance isn't coincidental since Bitcoin is one of the most-preferred payment options for threat actors.

The 'raphaeldupon@aol.com' Ransomware's payload may include support for other attacks, such as changing the wallpaper, displaying misleading pop-ups, or removing the default backup information. However, malware researchers only can confirm the text messages that it drops, which supply the e-mail address in its name for ransoming negotiations. Any users considering paying for the unlocking help should, first, remember that Bitcoins require consent from both parties for refunding, which makes a tactic relatively likely.

Keeping Your Coinage Out of Criminal Hands

It's not yet knowable if the 'raphaeldupon@aol.com' Ransomware's address is the real name of the threat actor – if it is, this oversight makes for an incredibly ill-advised campaign that will lead the authorities to him immediately. Whatever the experience or identity behind the 'raphaeldupon@aol.com' Ransomware campaign's admin, users should assume that decryption isn't possible necessarily. Best practices for protecting your files from threats of this classification include keeping backups, updating them regularly, and storing them on separate devices, such as USBs or remote servers.

File-locking Trojans have a statistically-notable reliance on spam e-mail, which includes both e-mail links and attachments, the latter of which may be text documents with vulnerabilities embedded in them. However, malware researchers sometimes find these Trojans being dropped after a brute-force attack or even through random downloads like torrents. Let your anti-malware products scan your downloads for safety and remove the 'raphaeldupon@aol.com' Ransomware as they detect it.

There's no advantage to leaving your files' health up to chance, which is the case whenever you're paying the ransom of Trojans like the 'raphaeldupon@aol.com' Ransomware. When so little is discoverable about its attacks, making good-faith assumptions is naive for anyone who wants their files kept safe.

Loading...