Home Malware Programs Ransomware R Ransomware

R Ransomware

Posted: April 3, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 930
First Seen: April 3, 2017
Last Seen: February 8, 2022
OS(es) Affected: Windows

The R Ransomware is a Trojan that attacks your PC by encrypting its media and dropping ransom-collection messages on your computer. These messages may misrepresent the con artist as someone that provides a form of technical support or anti-malware assistance, although malware researchers strongly suggest against paying the fee. Recover your files by any alternatives you require and remove the R Ransomware with any qualified anti-malware tool.

Trojans Offering Healing After the Hurting

It often isn't necessary to invest much into the programming to profit off of previously proven threat business models, such as ransoming a victim's files after encrypting them. Many threat actors prefer to emphasize social engineering techniques that trick users into responding towards old-fashioned infection vectors and payloads more profitably. The R Ransomware stands out as an example of a Trojan incorporating a persuasive tactic in its ransoming infrastructure successfully, which other threats also could implement with minimal difficulty.

The R Ransomware uses the often-seen standard of the AES-256 encryption to encode your files, such as documents, spreadsheets, archives, sound clips or pictures. The R Ransomware also generates a key that it locks behind a second, RSA-based cipher to keep the victims from cracking it and unlocking their files freely. Then, the R Ransomware creates an English-based text message for soliciting payments for its decryptor. Threat actor eschews any mentions of the victim's being under duress and warns against using third-party recovery tools that often are viable solutions for other file-encrypting Trojans.

You can find more details of the R Ransomware's ransoming plan by following its instructions and accessing the con artist's Website via the Tor browser. This site portrays the remote attacker as being an unaffiliated PC security company, despite having no credentials or brand visibility. The R Ransomware's website still asks for payment in the Bitcoin cryptocurrency. Malware analysts can confirm ransoms of over two thousand USD in value, which makes the R Ransomware's campaign likely of targeting unprotected business servers instead of recreational PC owners.

Emptying the R Ransomware's Bitcoins Jar

The R Ransomware refers to the ransom payments it demands as being 'donations.' Much like actual benefactions, there's no guarantee that the donating party will profit in any way from the expenditure, which the con artists can collect without bothering to exchange a decryptor. For most threats of the R Ransomware's classification, malware experts suggest trying free decryption software, assuming backups aren't available. Backups on unconnected peripherals or protected cloud servers are viable options for eliminating the long-term damage potential of this Trojan's payload especially.

Businesses often are compromised by Trojans like the R Ransomware after receiving spam e-mails with an attached Trojan dropper that can install threats under false pretenses. Systems not protected with proper network settings and passwords adequately also may be vulnerable to brute force attacks, which the con artists use for targeting valuable business entities especially. The loss of server-wide data caused by not detecting and removing the R Ransomware in time is one of the primary ways Trojans of its type can justify their thousand-dollar Bitcoin demands.

Ransoming messages are an important component of threats like the R Ransomware, and reading them sometimes is helpful for identifying the family of threatening software. However, always take what you read with a grain of salt, remembering that the people attacking your files for money have almost no reason not to add lies to the bargain.

Related Posts

Loading...