Home Malware Programs Ransomware Ruby Ransomware

Ruby Ransomware

Posted: May 10, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 46
First Seen: May 10, 2017
OS(es) Affected: Windows

The Ruby Ransomware is a file-encryption Trojan that blocks other programs from opening your files by enciphering them with a custom algorithm. Since decryption research is ongoing, victims should restore their locked content through a backup whenever possible. Updated anti-malware programs also may delete the Ruby Ransomware during its installation routine, at which time its file usually will be named to imitate some form of 'safe' software.

The Shine of Ruby Dust Coating Your Files

Courtesy of a new threat actor known only as Hayzam Sherif, PC users are getting another hazard to encourage their scheduling backups: the Ruby Ransomware. While the Trojan uses a very standardized, encryption-based attack for locking your files, it also has a unique, minimalist pop-up function that helps the victim find customized information for paying its ransom. As usual with similar threats malware experts analyze, the Ruby Ransomware asks for a cryptocurrency to keep you from recovering your money afterward.

The Ruby Ransomware uses AES-based encryption, although malware experts have yet to verify whether or not the routine is vulnerable to decryption from third parties. The files locked by this encryption attack, such as documents, also acquire the '.ruby' extensions that the Ruby Ransomware injects after any default ones (such as 'text.txt.ruby'). However, being unable to open these files is only one of two symptoms of the Ruby Ransomware's final payload.

The Trojan's last symptoms include generating a detailed HTML page with its ransom demands, along with a pop-up with buttons for displaying your ID number or redirecting you to the above Web page. Unusual use of the English terminology implies that Hayzam Sherif isn't a native speaker, and malware experts can confirm some Spanish-language data details in some of the Trojan's components. An overwhelming majority of similar campaigns request payment through non-refundable methods, such as Bitcoins, before possibly returning the victim's files.

Cracking a Gem of a Trojan

By keeping things simple and avoiding extraneous details, the Ruby Ransomware presents an easy-to-understand ransoming system that might convince victims into paying for file restoration. However, paying a ransom almost never ties into automatic decryption features, and Hayzam Sherif is unlikely to request any payments that would be subject to refunds. Until malware experts can analyze the Ruby Ransomware further and determine its susceptibility to decryption, backups are your files' best chance of not being locked permanently.

The Ruby Ransomware's campaign hasn't seen significant distribution in the wild, and its infection vectors still are in flux. Most threat actors distribute file-encrypting Trojans like this one through the help of EKs like the Rig Exploit Kit or e-mail attachments. Changing your Web-browsing settings for covering potential vulnerabilities and letting anti-malware tools scan all new files could block or delete the Ruby Ransomware before an infection could occur.

To extortionists, Trojans like the Ruby Ransomware represent the shine of illicit profits made from taking what's not theirs either temporarily or in perpetuity. As campaigns like this one so clearly demonstrate, taking the same steps to protect your digital possessions that you would take for your 'real world' ones never is a waste of time or money.

Related Posts

Loading...