Home Malware Programs Ransomware Shujin Ransomware

Shujin Ransomware

Posted: May 23, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 101
First Seen: May 23, 2016
Last Seen: January 8, 2023
OS(es) Affected: Windows

The Shujin Ransomware is a file-encrypting Trojan: a threat that barricades access to your PC's data until you transfer payments over to its administrative entities. Despite a convoluted ransoming process and an unusual choice of target regions, the Shujin Ransomware, overall, conducts the same types of file encryption algorithm-based attacks that one would expect of most similar Trojans. Accordingly, malware analysts can point out backup strategies for dealing with its payload, and traditional anti-malware utilities for removing the Shujin Ransomware from your machine.

Threatening File Encryption Migrates Eastward

As a natural evolution of the early, screen-locking styles of ransomware, file-encrypting Trojans naturally have been conducting the majority of their large campaigns within Europe and North America. However, that fact may have just changed with the identification of the Shujin Ransomware, which may be the first Trojan encryptor ever to target Chinese residents, specifically. While its methods of distribution and installation still are being observed, its intricate ransom process includes details that would be to the convenience of Chinese victims and inapplicable to PC owners of other nations.

Also commonly identifiable as a variant of the Troyano family, the Shujin Ransomware encrypts files such as text documents, after being run. No effort appears to be made to harm the PC owner's operating system, although malware experts can't yet verify to what extent any detectable backup resources suffer an impact. Most hostile file encryptors, but not all, will include deleting default Windows backups in their routines.

Although its encryption attack is standard, the Shujin Ransomware follows the attack up with a particularly convoluted ransom process, meant to force you to pay money for decrypting your files. Ransom TXT notes containing Chinese-language instructions and Web links will redirect the victim to the TOR browser, which loads a specialized decryptor-downloading site. The website requires a code that the con artists provide automatically, and the decryptor demands a key, which the con artists provide after payment. User-friendly features provided in this process include 'helpful' image tutorials, a status checker for payments, and various decryptor application functions, such as an encrypted content search.

Making Trojan Solutions an International Effort

In both its language choice and its recommendations on acquiring the appropriate funds and programs, every step of the Shujin Ransomware's ransom process tailors itself to Chinese-speaking PC users. For the present, malware experts can't confirm the functionality of the 'official' decryption program. However, its implicit availability does prevent con artists simply from withholding the tool after taking the money.

While the decryption program is real, the success of a file decryption after paying con artists for the service isn't always sure. Although paying the ransom could be considered as a last resort, malware researchers usually find adequate preparation in the form of reliable backup methodology to be more than sufficient for blocking damages from any file encryptor. Detachable physical drives, as well as, to a lesser extent, network-based storage solutions, can give you copies of your data unaffected by the Shujin Ransomware. Overwriting your encrypted files with a backup is affordable and more dependable than asking a Trojan's author to keep his word.

Always try to remove the Shujin Ransomware and disinfect the rest of your PC before restoring your content. Malware experts do sometimes see file encryption Trojans deleting themselves, but running anti-malware scans after a confirmed infection always is better than assuming that your computer is safe.

Loading...