Home Malware Programs Ransomware Rxx Ransomware

Rxx Ransomware

Posted: March 4, 2020

The Rxx Ransomware is a file-locking Trojan that's a part of the Crysis Ransomware or Dharma Ransomware family. As a Ransomware-as-a-Service variant, it may block files on your computer by encrypting them, remove their backups, and extort money through dropped ransom notes. The availability of a secure backup is the primary determinant of any media recovery, although professional anti-malware products should block and delete the Rxx Ransomware.

Ransomware-as-a-Service Setting Sail for Your Work Files

Ransomware-as-a-Service families tend towards being long-term entities in the threat landscape, and the multi-year Crysis Ransomware family is proving itself persistent similarly. New members from this year, alone, include the 2NEW Ransomware, the 8800 Ransomware, the Devil Ransomware, the YKUP Ransomware, and the fresh-off-the-lines the Rxx Ransomware. Although the Rxx Ransomware's payload has an unusually colorful warning message, other issues related to its attacks, such as data encryption, are expected aspects of illicit business framework.

The AES algorithm-based encryption is the hallmark of the Rxx Ransomware's family, along with many competing ones, and is the basis of the 'file-locking' attack. This feature lets the Rxx Ransomware convert file data into non-opening ciphers, making the file unusable temporarily. Most file-locking Trojans also help with identifying the restricted content through adding extensions, such as 'rxx,' in this case. Vulnerable media types include Word and PDF documents, spreadsheets, pictures like JPGs and BMPs, music, archives, and server databases, particularly.

The Rxx Ransomware includes a Notepad message with warnings and instructions concerning the encryption and its ransom-based solution for reversing it. The more noticeable feature is, however, its pop-up alert, which includes recommendations of using the TOR browser and some basic graphical formatting, such as a pirate skull-and-sabers logo. Criminal responses to receiving their money are unpredictable, unfortunately, and malware experts recommend against paying the ransom, whenever possible.

Taking the Danger Out of Opening New Downloads

Some versions of the Dharma Ransomware family, as it also is known by, will use targeted and non-consensual attacks, such as brute-forcing passwords or riding in the drive-by-download mechanisms of an Exploit Kit. Admins can choose stronger passwords that stand up to such attacks, and all users should apply security patches and avoid installing software or updates from high-risk sources – such as a random advertisement. The Rxx Ransomware's campaign also has high chances of using e-mail phishing lures, with the traditional installation exploits hiding inside of macro or vulnerability-hosting attachments.

Besides taking infection-preventing precautions, users also should store their media safely away from the attacks of Trojans like the Rxx Ransomware, or competition like Hidden Tera and Globe Ransomware. Most files in a Windows environment are at risk, and users should save their work to another, password protected – or even detachable – storage device, when it's possible. The Rxx Ransomware's family is known for providing services to multiple threat actors, and attackers may go to some lengths for accessing network-connected systems or deleting backups, such as the Restore Points.

Due to strategies de-emphasizing any long-term surveillance, file-locking Trojans like the Rxx Ransomware don't make significant efforts towards evading threat-detection metrics.

However, removing the Rxx Ransomware doesn't convert any victim's files back to their old selves. With decryption being an expense of hundreds or thousands of dollars, no one should take any Ransomware-as-a-Service family, let alone one as well-known as the Rxx Ransomware's group, for granted.

Related Posts

Loading...