Home Malware Programs Ransomware Skeleton Ransomware

Skeleton Ransomware

Posted: December 18, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 39
First Seen: October 28, 2022
Last Seen: October 28, 2022
OS(es) Affected: Windows

The Skeleton Ransomware is a fork of the Blind Ransomware, a file-locking Trojan with the ability to block content via encryption. Files of arbitrary media formats not opening, the presence of text messages requesting ransoms, and non-consensual changes to your files' names are symptoms of an infection. Professional anti-malware products should eliminate the Skeleton Ransomware automatically, but users without backups may not be able to regain their media necessarily.

A Trojan's File-Locking Work from Blind to Bony

The cybercrooks that are working with the source of the Blind Ransomware are making substantial changes to it for creating a new Trojan, albeit one with a highly similar payload. The update, the Skeleton Ransomware, uses a low-technical format of ransoming message, which may help its compatibility with more system types. The Skeleton Ransomware also, still, locks files to hold them hostage with a custom encryption algorithm.

Although sample size with the Skeleton Ransomware remains small, malware researchers did determine that the Trojan is beyond its initial development stage. Threat actors are distributing the Skeleton Ransomware to unknown users, possibly by using spam e-mails or brute-force tools and using it to lock different digital media kinds. The Skeleton Ransomware's file-locking feature, as usual, doesn't display a pop-up, notification window, or other UI elements that could warn the victim while it's ongoing. Besides blocking your files, the Skeleton Ransomware also adds the '.[skeleton@rape.lol].skeleton' as a reference to its ransom method.

The Skeleton Ransomware uses a Notepad note for its ransoming instructions, which tell the user how to pay in return for getting a decryption solution. Malware experts have no data on any current asking prices but do discourage paying these ransoms, which are unreliable inherently, when possible. Readers should note that the e-mail address is for a real, small-scale service and not a joke or a placeholder.

Stop Your Work from Going All Skin and Bones

Some of the Blind Ransomware's family members and variants are compatible with decryption programs that different AV vendors develop and distribute without charge. Users without other options, such as a backup, may wish to contact reputable researchers or companies for extra help with updating a decryptor for the Skeleton Ransomware. However, this solution is never as reliable as backing your work up to a device that isn't at risk of infection, such a detachable USB drive.

Most file-locking Trojans arrive via e-mail spamming campaigns that can disguise their installation files as being 'safe' content like invoices. PC users should be willing to scan their downloads for any potential security risks, which include macro-based vulnerabilities launching from inside actual text documents. Anti-malware programs may delete the Skeleton Ransomware from your computer safely but don't provide any file-unlocking capabilities.

For a threat actor, if an attack works once, it makes sense to recycle it until it doesn't. The common-sense solution to the Skeleton Ransomware and the Blind Ransomware's other variants is to back up your files, practice safe behavior online, and use prevention-based security solutions.

Related Posts

Loading...