Home Malware Programs Ransomware Retis Ransomware

Retis Ransomware

Posted: December 20, 2017

Threat Metric

Ranking: 18,626
Threat Level: 8/10
Infected PCs: 553
First Seen: November 20, 2022
Last Seen: September 7, 2023
OS(es) Affected: Windows

The Retis Ransomware is a C#-language Trojan that runs a background data-encrypting routine to block you from being able to use different formats of media, such as text documents. Post-encryption symptoms of an infection include hijackings of the desktop's background image and the presence of new extensions on the locked content. Malware analysts recommend having a robust combination of anti-malware protection for removing the Retis Ransomware and backups for retrieving anything that it damages.

A Trojan that Aims at Small Targets for Big Damage

A threat actor who calls himself RETIS is preparing to launch a campaign of file-locking attacks and extortion for the unlocking solution, with its infection strategies unidentifiable currently. Although decoding the blocking methods of the available samples should be straightforward relatively, malware researchers can't promise that future builds of the Retis Ransomware will refrain from changing the cryptography protocols, which use a hard-coded key currently. Users will, as usual, require backups for guaranteeing the retrieval of everything that this threat might block absolutely.

The Retis Ransomware is a C# programming language and Windows-based application, which attacks less than twenty formats of content. It also excludes the C drive, which may be a configuration choice strictly for testing purposes. An uninterrupted Retis Ransomware infection locks text documents (DOC, DOCX, ONE, TXT and PDF), Excel spreadsheets (XLS and XLSX), PowerPoint presentations (PPT and PPTX) and pictures (JPG, JPEG and PNG). These restrictions could help the Retis Ransomware finish its attack more quickly than typical and prevent a victim from identifying or interrupting it.

Although users can't open these files until they decrypt them again, they can recognize them from the new extensions the Retis Ransomware adds as signatures. Note that the Retis Ransomware shares its extension of '.crypted' with similar Trojans, such as the Nemucod Ransomware, the Masterlock@india.com Ransomware, and the ProposalCrypt Ransomware, although malware experts find no direct relationships between them.

Piracy Logos Spewing out Ransom Demands

The Retis Ransomware locks the user's desktop to an internal image, which is, so far, its only means of communicating its ransoming demands. Besides identifying Retis as the author and displaying ASCII-based skull art, the Retis Ransomware's picture also instructs the victims, in French, to pay within twenty-four hours for the file-unlocking key. Since malware experts are concluding that free decryption is highly possible with the Retis Ransomware's current release, any victims should consult with a trusted cyber-security researchers for free alternatives, before paying.

New versions of the Retis Ransomware may include a dynamically-created or secured key, which could block most efforts at a decryption solution. However, the people administrating threats of the Retis Ransomware's classification usually prefer currencies that allow them to commit fraud at will, which makes having a previous backup the surest recovery choice for all users. Anti-malware programs also should delete the Retis Ransomware as soon as they identify the threat on your computer.

Retis may be hoping to make the most out of a minimum of infection duration on any given computer. Since the Retis Ransomware is careful to target file types that almost any user would possess and value, it goes to show that taking a small amount of time to back that media up is a good idea.

Loading...