Home Malware Programs Ransomware Scarab-Red Ransomware

Scarab-Red Ransomware

Posted: July 5, 2018

The Scarab-Red Ransomware is a file-locker Trojan from the Scarab Ransomware family, which extorts Bitcoins from victims in Russian and English-based regions. Media like movies, audio, spreadsheets, documents, and pictures is at risk of suffering from this locking routine, which does not always have a free recovery solution. Keeping anti-malware programs ready for quarantining or deleting the Scarab-Red Ransomware, as appropriate, and storing backups safely, can protect both your PC and your work from this threat.

Red is in Fashion for Capturing Digital Media

The Scarab Ransomware family is enjoying continuing success through affiliated threat actors, who pay for the advantage of deploying their custom variant of the file-locker Trojan against any victims of their preference. New versions of this family range from the Russian-based Scarabey Ransomware, as well as English releases like the Scarab-Leen Ransomware, the Scarab-Oblivion Ransomware, and the newest the Scarab-Bitcoin Ransomware and the Scarab-Red Ransomware. As is typical for its family, the Scarab-Red Ransomware can block a significant quantity of files on any Windows PC that it infects with no detectable symptoms until after the fact.

The Scarab-Red Ransomware and other Trojans from its family are Delphi-coded programs that run in Windows environments up to, and including Windows 10. The Trojan uses a Registry exploit for auto-launching and includes an encryption feature that runs as a silent, background process. This AES encryption may prevent the users from opening non-OS file formats in various locations, including the desktop, Documents, and Downloads folders. According to the previous filter lists that malware experts are analyzing, the Scarab-Red Ransomware is most likely of blocking Microsoft Office work, PDF documents, pictures, and space-compressed archives like ZIPs.

The Scarab-Red Ransomware doesn't use the same format of ransom note as the other, most recent version of its family, the Scarab-Bitcoin Ransomware. However, the overall details of its instructions are similar and include a BitMessage address for negotiating with the threat actor and an ID that's mandatory for confirming the victim's identity. This family always conducts its ransoms in Bitcoins, which the threat actor can take without needing to serve the file-unlocking solution back to any victims. As a result, our malware experts don't recommend paying.

Washing the Red Out of Your Files

The Scarab-Red Ransomware's AES encryption method doesn't, necessarily, damage the files permanently, which victims can identify through their '.red' extensions and Base64-converted names. However, neither do malware experts have confirmation of a free, public solution for decrypting any files that this Trojan encrypts. Because the Scarab-Red Ransomware may delete locally-stored backups and the Shadow Volume Copies, any users needing to keep their media secure should be sure of saving copies on other devices, such as USBs.

Many attacks from the same family as the Scarab-Red Ransomware subvert Remote Desktop Protocol settings, but the threat actor, often, owes his initial access to the PC to bad passwords and login combinations. Following traditional guidelines for managing your passwords securely can keep brute-force tools from giving control of your PC to a remote attacker. Most anti-malware programs also can delete the Scarab-Red Ransomware, and other Scarab Ransomware releases, without any obstacles.

The profit that a new Scarab-Red Ransomware campaign makes correlates with the poor security choices of the Windows users it attacks. Making smart decisions about how you surf the Web and administrate your network will leave you many Bitcoins richer for the little time you invest into it.

Loading...