Home Malware Programs Ransomware Redl Ransomware

Redl Ransomware

Posted: December 31, 2019

The Redl Ransomware is a file-locking Trojan that can make your documents, pictures and other media non-openable. This encryption is, generally, secure from third-party intervention, and most users can only recover through a previous backup. Anti-malware utilities also may protect your work by deleting the Redl Ransomware immediately or uninstalling it afterward.

The STOP Ransomware Ends the Year on a 'High' Note

With over a full year of attacks to its name, the STOP Ransomware or the Djvu Ransomware Ransomware-as-a-Service is an ever-lengthening thorn in the side of PC users and unprotected networks. Coming after Trojans with random names like the Peet Ransomwar, Mkos Ransomware, the Righ Ransomware, and the Zobm Ransomware, the Redl Ransomware is the latest model 'off the shelves.' And, as usual, it sees little need of changing its ways, after previous successes in extortion.

The Redl Ransomware is a Windows-based program and may run after a threat actor hacks a weakly-password-protected server or tricks a victim into opening a corrupted e-mail attachment. The more critical attack features by the Redl Ransomware include:

  • Locking files (with AES encryption and secondary RSA security)
  • Deleting the Windows Restore Points or the Shadow Volume Copies
  • Adding its extension into filenames
  • Leaving ransom notes in a Notepad format

Some features that malware experts also see inconsistently in the STOP Ransomware's family include disabling other security programs, dropping additional spyware for collecting credentials or changing Web-browsing settings. Typically, the first and third of these features prevent victims from gaining security-related assistance. The second one can help a hacker compromise the rest of a network (or sell passwords on the black market).

Keeping Your Server from Seeing Red

While encryption is a challenging puzzle for any researcher's solving, preventing the Redl Ransomware attacks from being productive is more manageable universally. Workers should be careful when handling e-mail attachments with macros, especially or while opening documents with outdated programs due to the frequent abuse of macro content and publicized vulnerabilities. Responsible password management also can help keep an attacker from gaining remote access to a system.

Pirated software is another frequent theme in the STOP Ransomware infection vectors. Users downloading cracks, cheating utilities, and copyright-infringing tools, mainly through torrents, run a risk of exposure to file-locking Trojans (and other threats). In particularly involved cases, some Trojans' authors even include fake GUI elements or installers for perfecting their disguise – until the Trojan starts locking files.

The anti-malware products by most well-known companies should, as usual, see through these simple evasion attempts and remove the Redl Ransomware automatically.

The Redl Ransomware operates just like its recent ancestors, from the Djvu Ransomware up to the Mkos Ransomware. But then, criminals have little incentive for changing their ways as long as there are unbacked up files for the picking and ransoming after the fact.

Related Posts

Loading...