Recovery Ransomware

Posted: December 20, 2018

Recovery Ransomware Description

The Recovery Ransomware is a file-locking Trojan that can block media content, such as documents, pictures, and music, by encrypting it with a DES algorithm. The Recovery Ransomware also creates a pop-up message with ransoming information for the decryptor that the threat actor holds. Free decryption methods for the Recovery Ransomware should be available for any users without backups widely, and a strong anti-malware product should eliminate the Recovery Ransomware on sight.

A Real Windows Offender of a Patch

Threat actors remain attentive to the possibilities of convincing the victims into downloading and running corrupted software through psychological manipulation and the hijacking of reputable brands, such as Adobe and Microsoft. It's the latter that's being part of one file-locking Trojan's exploits, less than a week before Christmas. The Recovery Ransomware is joining similar threats like the DCRTR-WDM Ransomware in pretending that it's a part of the Windows Defender.

The Trojan's executable pretends that it's a patch for updating the above security software for tricking victims through corrupted advertising pop-ups or hoax domains that are faking affiliations with Microsoft possibly. However, once it's running, the Recovery Ransomware begins encrypting the files that it finds in specific locations, of which malware experts are verifying most Windows account media-related directories. These folders include documents, music, pictures, and videos. The Recovery Ransomware locks the files therein with a DES-based encryption algorithm with no additional security (such as RSA encryption on the key).

Besides appending a 'ransomwared' extension onto those files' names, the Recovery Ransomware has an extra feature, which worth mentioning: its pop-up ransom note. The threat actors decline of providing more than an e-mail address for more negotiations, but the UI does include access to the decryptor. Current versions of the Recovery Ransomware may not be walling off this feature behind a custom password, and victims can test it for unlocking their files safely.

Recovery without a Ransom's Risk

The current versions of the Recovery Ransomware show a significant vulnerability to decryption investigation by any cyber-security specialist with a basic familiarity of cryptography. This limitation isn't present in all file-locker Trojans, and the majority do use encryption methods that are unbreakable by third parties. Backing up media from the noted directories to other devices will preserve it from attacks and give users ample restoration options after disinfecting the PC.

The Recovery Ransomware is, as its opening exploit suggests, a Windows program. Users can protect themselves from unsafe advertising carrying its fake update by using an ad blocker and disabling features such as pop-ups, JavaScript, and Flash from running in their Web browser. Updates for Windows software always should arrive through an official domain like microsoft.com. Any Windows users with conventional anti-malware solutions should remove the Recovery Ransomware without its attack loading and locking any media.

Saving files in default locations and trusting an update from a bad link can, very quickly, turn protected files into vulnerable ones. While it's unfortunate that some users are falling for 'fake update' tactics like the Recovery Ransomware's attacks, hopefully, they'll learn to watch their downloads in the future more carefully.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Recovery Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Related Posts

Home Malware Programs Ransomware Recovery Ransomware

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.