Home Malware Programs Ransomware 'satco@tutanota.com' Ransomware

'satco@tutanota.com' Ransomware

Posted: February 6, 2019

The 'satco@tutanota.com' Ransomware is a new version of the Dharma Ransomware, a major sub-division of the Crysis Ransomware's family. The 'satco@tutanota.com' Ransomware represents a danger to most of the files on any infected PC due to being designed for 'locking' them with encryption and deleting their backups. The users can keep backups elsewhere for safekeeping and use anti-malware tools for blocking attacks or uninstalling the 'satco@tutanota.com' Ransomware.

The Crisis of File-Locker Trojans Continues Unabated

The success of Ransomware-as-a-Service, or renting out file-locker Trojans to other criminals who handle the distribution strategy, is inarguable. Readers and threat researchers alike can find evidence of its profitability and proliferation in families such as the half-Russian Scarab Ransomware, the Globe Ransomware and its 'imposter' competition, and the Crysis Ransomware. The latter group is active lately particularly as security researchers continue pulling up new versions, like the 'satco@tutanota.com' Ransomware.

The 'satco@tutanota.com' Ransomware is part of a recent spate of file-locking Trojans that run with different extensions and contacts but, in most details, offer up the same types of attacks. For contrast, the readers could look at the just-as-new 'backdata@qq.com' Ransomware and the 'usacode@aol.com' Ransomware, or the much older 'wisperado@india.com' Ransomware and the Wallet Ransomware. All of these threats use effectively-impenetrable encryption (AES secured by RSA) for blocking media formats on your computer, including text documents, images, databases, spreadsheets, archives or music.

The 'satco@tutanota.com' Ransomware follows the usual path of adding an extension ('.air') to the filenames for indicating what's a hostage. The 'satco@tutanota.com' Ransomware also may create both text and advanced Web page files that carry its threat actor's instructions and the associated e-mail in its name. Malware experts discourage paying ransoms as a rule, since refund availability is up to a threat actor who may not have any interest in providing a working decryption service. Users depending on local backups also may find that the 'satco@tutanota.com' Ransomware deletes their Shadow Volume Copies or the Restore Points beyond any possibility of retrieval.

Throwing a Fake Part of Windows Out the Window

The 'satco@tutanota.com' Ransomware, like many file-locker Trojans, is concealing its EXE as part of the Windows OS –, 'winhost.exe' specifically. Such disguises are traditional among different threats of this type but are prolific among ones that threat actors distribute after brute-forcing their way into the target's local network especially. The users also could infect their PCs through interactions with spam e-mails, which are just as likely of being the instigating factor for business networks, governments and non-governmental organizations.

Disabling Word macros and in-browser scripts will provide not-insignificant protection from some of the attacks that the criminals use in the modern-day threat landscape. It's equally essential for the victims to have access to backups that the 'satco@tutanota.com' Ransomware can't wipe or encrypt, such as a cloud service or detachable USB. Anti-malware programs, while adept at finding and removing the 'satco@tutanota.com' Ransomware, can offer no hope regarding decryption or unlocking your files.

Besides the fee and the distribution footwork, new versions of the Dharma Ransomware like the 'satco@tutanota.com' Ransomware are incredibly low-effort campaigns. With it being more comfortable than ever for these attacks to take place, the users need to take responsibility on protecting their files from every reasonable angle.

Loading...