Home Malware Programs Ransomware SOLO Decrypter Ransomware

SOLO Decrypter Ransomware

Posted: October 24, 2018

The SOLO Decrypter Ransomware is a file-locker Trojan that encrypts media on your PC, such as pictures, spreadsheets, or documents, and holds them hostage so that it can demand payment for the decryptor. Some versions of the SOLO Decrypter Ransomware are including glitches that also block the ransoming notes that they generate, although malware experts don't recommend paying the ransom, regardless. Have a suitable anti-malware product block or delete the SOLO Decrypter Ransomware, and recover any damaged files through the usual means, such as your last backup.

The Trojan that Locks More than It Intended

Germany is experiencing attacks by a new file-locker Trojan whose payload includes some mistakes related to how it determines what files it blocks. While malware experts note the absence of any evidence implying that the SOLO Decrypter Ransomware could cause permanent harm to the OS or other, critical PC components, this threat does have the possibility of making its ransoming messages unreadable to its victims. Those who can read its notes will find that the SOLO Decrypter Ransomware operates similarly to the Globe Ransomware and other, large Ransomware-as-a-Service families.

Besides all attacks, for now, taking place inside of Germany's borders, the SOLO Decrypter Ransomware also tailors its attacks for German speakers. It uses an unknown encryption method (although it claims that it uses the AES) for blocking files and drops a local HTML file on the computer. Unlike many file-locker Trojans, the second feature doesn't take place after the completion of the data-enciphering necessarily, meaning that the message can be one of the files that the SOLO Decrypter Ransomware attacks and locks accidentally. Content that the SOLO Decrypter Ransomware encrypts should be identifiable by the '.SOLO' extensions that the Trojan appends to the names.

When it's legible, the SOLO Decrypter Ransomware's Web page delivers German-language instructions on paying a 0.2 Bitcoin ransom for the decryption solution. The wallet is, seemingly, unique to this campaign, and malware researchers aren't finding any transaction history that would imply a successful attempt at extortion. Victims of the SOLO Decrypter Ransomware infections should avoid paying until after trying all other solutions since the criminals can withhold their decryption help without any danger of losing a Bitcoin-based ransom to a refund.

Keeping a Trojan as Harmless as It is Illegible

The ransom fee that the SOLO Decrypter Ransomware levies make its attacks equally appropriate for both recreational PC users and mid to small businesses with unsecured networks. Infection methods could include spam e-mail-based attachments, torrents, exploit kits that abuse in-browser software vulnerabilities or brute-force hacks. Network administrators should stay on guard for the latter by avoiding using unsafe login credentials that are easily breakable, while most other infection strategies are blockable with appropriate security products and patching their software regularly.

Even if the SOLO Decrypter Ransomware is truthful about its encryption technique, which isn't guaranteed, the AES isn't always decryptable by free software. Back up your files to portable storage devices or cloud storage for protecting them from non-consensual encryption and other 'file-locking' attacks. Anti-malware products have great success identifying most threats of this classification and should delete the SOLO Decrypter Ransomware safely in situations involving its accidental introduction by the user.

Although the SOLO Decrypter Ransomware is coming for German PC files, most file-locker Trojans don't stay isolated to single countries for long. The fact that the SOLO Decrypter Ransomware 'locks' its warning message may seem humorous, but criminals not being careful about what files they damage is no joke to the victim.

Loading...