REKTLocker Ransomware
Posted: August 10, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 35 |
First Seen: | August 10, 2016 |
---|---|
Last Seen: | February 21, 2023 |
OS(es) Affected: | Windows |
The REKTLocker Ransomware is a Trojan that encrypts and renames your files to hold them up for ransom. Conclusive protection against this category of threat normally includes monitoring e-mail and other browser-based activities for potential infection vectors, along with using backups that the REKTLocker Ransomware can't attack. Prevent any ongoing damage to your saved data by using anti-malware programs to scan your PC and remove the REKTLocker Ransomware, as well as other threats that could be responsible for its installation.
The New Threat Wrecking Your Data for Personal Gain
Although it's possible to get a sense of both the driving philosophies and personalities of threat authors through their works, not all con artists are equally expressive. Some, such as the author of the REKTLocker Ransomware, prefer utilizing preexisting code with a minimum of effort put into their attacks. In spite of its small scope and simplicity, the REKTLocker Ransomware is just as viable as any other file-encrypting Trojan reusing the thoroughly-proven code in the EDA2 project. The REKTLocker Ransomware shares this common lineage with a growing group of threats that includes the SeginChile Ransomware, the VenusLocker Ransomware and the AlphaLocker Ransomware.
The REKTLocker Ransomware encrypts files through an algorithm malware experts still are identifying, although some sources speculate on RSA-2048's likely usage. Along with encrypting the data, the REKTLocker Ransomware also inserts the '.rekt' extension onto each file's name ('rekt' being a gaming slang term for a severe or embarrassing defeat). The REKTLocker Ransomware alerts the victim to the attack's having taken place with both an image file and a text file, although the majority of its information loads through the latter.
The ransom message in the REKTLocker Ransomware's note is terse and asks for a 1 Bitcoin payment to a wallet address. The REKTLocker Ransomware also delivers a warning about the specificity of the decryption process that could restore your information but doesn't offer further details on how encryption works, or how paying the con artist provides any resolution to the attack. Malware experts also saw no contact information associated with the REKTLocker Ransomware's ransom messages, which is an unusual omission for Trojans of its type that lack any form of decryption UI.
How to Stop Getting 'Rekt' by the Newest Trojans
'Getting rekt' is a process most PC owners associate with awkward losses at the hands of cutthroat multiplayer scenes but is a more high-risk prospect when it pertains to PC security and the possibility of a Trojan blocking your data. The abuse of EDA2 code by programmers with little talent or enthusiasm continues allowing the con artist landscape easy access to file encryption attacks, and even following the REKTLocker Ransomware's payment instructions may not give you a working decryptor.
Although you may consult with PC security experts on decrypting your data without paying the REKTLocker Ransomware's author, decryption isn't always possible. Backups incapable of being attacked by the REKTLocker Ransomware, such as protected cloud servers or external devices, offer a way to keep your content safe without any undue expenses or research into complex recovery solutions.
The REKTLocker Ransomware bases itself on an easily-recognizable source of code but is a particularly new variant of EDA2. Keep your anti-malware products fully-patched to let them identify and delete the REKTLocker Ransomware before its payload can launch. Most importantly, avoid paying the price of the REKTLockers having 'free' coding knowledge from EDA2 and eliminate any contact with Trojan delivery methods, which malware experts often isolate to illegal downloads and disguised e-mail attachments.