Home Malware Programs Ransomware ShurL0ckr Ransomware

ShurL0ckr Ransomware

Posted: February 8, 2018

The ShurL0ckr Ransomware is a file-locking Trojan that can keep you from opening documents and other media by encrypting them. Its attacks include significant support for targeting cloud-based storage systems, and malware experts rate business, NGO and government entities as being at high risk for infections. Third-party anti-malware solutions may delete the ShurL0ckr Ransomware or keep its attacks from occurring, although secure, isolated backups remain valuable for defending your files.

The Cloud Becomes a Little Darker than Usual

Although cloud backups are part of the standardized defense against different Trojans types that damage files, they're not perfect protection, and malware experts sometimes see attacks against them. The ShurL0ckr Ransomware, which joins a sharp minority of file-locking threats, such as some versions of the Cerber Ransomware, is one of the few Trojans that can encrypt data on cloud-based storage services. The Trojan also has some similarities to the old Satan Ransomware, although its nearest relative is Gojdue.

The ShurL0ckr Ransomware is a RaaS or Ransomware-as-a-Service program, which allows different people to rent and deploy it via whatever means they prefer, in return for paying an upfront fee or a percentage of any ransoms that they're collecting. Current infection methods for the ShurL0ckr Ransomware imply that victims are compromising their PCs after opening corrupted e-mail attachments, which could be disguising themselves as documents related to package deliveries or workplace messages. After its installation, the ShurL0ckr Ransomware progresses with encrypting and blocking different media formats, both on the local system and any network-accessible storage devices.

This Trojan also includes support for harming the data that's on popular cloud storage services like Google Drive or Microsoft Office 365. Most significantly, malware researchers can confirm that this subset of the ShurL0ckr Ransomware's payload also bypasses the built-in anti-malware protection that these companies offer by default. This functionality indicates that the ShurL0ckr Ransomware is well-equipped for harming business networks and server infrastructure.

Getting a Backup that You can Depend on During Attacks

Although not many file-locking threats include the ShurL0ckr Ransomware's in-depth anti-cloud features, a sizable percentage of them do use various methods for damaging data across multiple PCs and storage devices. Maintaining strict segregation between emergency backups and any everyday-use systems can help eliminate some of the danger of the ShurL0ckr Ransomware disabling the readiest data-restoring solutions. Malware experts encourage installing third-party anti-malware programs, in addition to any default solutions already enjoying the support of your cloud storage company, for maximizing the potential of blocking the ShurL0ckr Ransomware.

The ShurL0ckr Ransomware's ransom requirements for gaining access to its unlocking solution are unknown, but most threat actors prefer Bitcoin or voucher-based payments. The Trojan also is a very recently-identifiable threat without an obvious connection to families like Hidden Tear, which, so far, is allowing it to avoid detection rates by many brands of security software. Always keep your anti-malware programs updated for helping their chances of deleting the ShurL0ckr Ransomware, and equivalent, zero-day threats, before your PC suffers any data loss.

Since RaaS Trojans like the ShurL0ckr Ransomware are emphasizing flexible and penetrating payloads increasingly, victimized PC users should stop assuming that after-the-fact security protocols can save their files necessarily. As necessary as backups are, keeping the ShurL0ckr Ransomware out of your network altogether is, clearly, the best of all possible worlds.

Loading...