Home Malware Programs Ransomware Sanctions Ransomware

Sanctions Ransomware

Posted: April 4, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 9
First Seen: April 4, 2017
Last Seen: November 24, 2022
OS(es) Affected: Windows

The Sanctions Ransomware is a Trojan (not directly related to the similar Sanction Ransomware) that can encrypt your files and load a Web page-based ransoming message. Threat actors distribute these Trojans to sell their decryption services to unlock the victim's encrypted data although these solutions may not be legitimate or functional. Besides backing up your files out of the Sanctions Ransomware's reach, you can protect your PC by having anti-malware tools removing the Sanctions Ransomware as soon as they detect it.

A Russian Bear Eyeing Your Files Hungrily

Con artists with ill-minded file-encrypting campaigns are maintaining their investments in easy to use, Web-based ransoming techniques that beguile their victims into paying money in blind faith. The Sanctions Ransomware is a new threat to use just such methods of coercion while it locks your files with a cipher simultaneously. Although some of the Sanctions Ransomware's symptoms are highly similar to the Dharma Ransomware family, malware analysts judge the two threats to be unconnected to each other technically.

Once again, the usual combination of the AES and RSA-based enciphering algorithms is in use for encrypting and blocking the files on your PC. The Sanctions Ransomware also appends the '.wallet' extension, also seeing used in other Trojan families, to help the victim determine which files it's locking. The Sanctions Ransomware's secondary symptom is the placement of a local Web page on either the desktop or the same directory as any encrypted content.

Malware analysts haven't seen the Sanctions Ransomware's Web page in other file-enciphering campaigns, but it does include much of the formatting preferences of old attacks. Its most high-visibility element is an image criticizing the US sanctions against Russia (although the text is entirely in English). The page also displays a unique ID number, an explanation of the encryption attack and a warning to pay Bitcoins within a time limit or lose your locked media. The Sanctions Ransomware offers the unusually generous limit of six days, possibly to alleviate the equally unheard of ransoming demands: six Bitcoins (roughly 6,500 USD).

Issuing the Only Sanctions that Work against Threats

The Sanctions Ransomware's threat actors are using the third-party service of Satoshibox.com for monetizing the decryptor solution's download instead of hosting an independent server. This change in hosting strategies could help the con artists update the payment methods of the Trojan campaign to avoid any interference from law enforcement or hosting companies. At the moment, the Sanctions Ransomware is too new for malware analysts to be able to verify whether or not any encrypted content is retrievable without taking the gamble of paying the ransom.

Restoring your encrypted files from a backup that the Sanctions Ransomware hasn't attacked is the least time-consuming and most dependable recovery option. For victims without backups, quarantining all threats with anti-malware products and seeking assistance from trusted entities in the anti-malware industry could provide a free decryption solution. Blocking the Trojan's installation by deleting the Sanctions Ransomware automatically with your anti-malware software upon its introduction to your system is highly recommended, as with any threats that can induce permanent data loss.

Malware experts emphasize that Trojans with very high ransoms, such as the Sanctions Ransomware, usually are in distribution in limited quantities against high-value targets such as entities in the business sector or branches of the government. Having employees who fail to follow basic network security guidelines is, increasingly, a mistake that may be too costly for anyone to afford.

Loading...