Home Malware Programs Ransomware RPD Ransomware

RPD Ransomware

Posted: July 16, 2018

The RPD Ransomware is a variant of the Rapid Ransomware, a file-locker Trojan that may block different formats of your media by encrypting them with an AES algorithm. These data-based attacks aren't always reversible under non-extortionist terms, particularly, and victims should depend on backups for keeping their work safe and recoverable. Have any anti-malware programs with good track records against this family of threats assist with uninstalling the RPD Ransomware or quarantining it preemptively.

Just a Rapid Tweak to Last Winter's Trojan

Ongoing analyses by experienced threat researchers are detecting a new update to the Ransomware-as-a-Service or RaaS Trojan of the Rapid Ransomware, which malware experts, previously, observed transitioning to the Rapid 2.0 Ransomware. The fresh release, the RPD Ransomware, is a minor variant instead of a major version update and is in live distribution. Infection statistics are in confirmation for the residents of at least ten, separate countries, although how the RPD Ransomware is installing itself is uncertain.

The RPD Ransomware still locks various formats of media, such as Word or Adobe PDF documents, by encrypting them with AES-256, but flags them with a new extension for labeling purposes ('.RPD'). Just like the first Rapid Ransomware, the RPD Ransomware also adds a Notepad file to high-visibility locations, such as the desktop, for giving its victims a series of ransoming instructions, thereby forcing them to pay for a decryptor.

Malware experts have yet to find any breakthroughs in the Rapid Ransomware's family that would lend themselves to the creation of a free decryption service for the RPD Ransomware. Any encrypted data may not be retrievable.

Slowing Down the Pace of Trojan Ransoming

Storing your backups in locations such as detachable or cloud storage can give your files a recovery option that doesn't require any form of decryption for succeeding. Since most file-locker Trojans' campaigns use one of several, prominent infection exploits, malware experts also can recommend additional defenses against a possible the RPD Ransomware dropper or drive-by-download attack:

  • Avoid opening e-mail attachments without analyzing them with appropriate security software Installers for various PC threats include document-embedded macros and files that use intentionally-incorrect names, icons or extensions.
  • Remote logins should have the protection of sufficiently complex and sophisticated passwords that the user doesn't share between different accounts. Failing to do so can give criminals access to a server or other PC by facilitating a brute-force attack.
  • Downloads from unusual or not-vetted sources, such as torrent networks, also should receive a full analysis by your security software. Criminals sometimes circulate threats like the RPD Ransomware by bundling them with AAA games or top-selling movies.

The correct implementation of these steps, as well as having anti-malware programs present for deleting the RPD Ransomware automatically, are the only reliable forms of protection against its data encryption.

The RPD Ransomware's family of the Rapid Ransomware could continue growing, or it may remain stagnant with a scant handful of variants. Whether or not various criminals stick with this 'brand' for their future attacks against the users' media is less relevant than whether or not the victims-to-be are enacting their backups and security standards correctly.

Related Posts

Loading...