Storm Ransomware

Posted: July 31, 2017
Threat Metric
Threat Level: 10/10
Infected PCs 97

Storm Ransomware Description

The Storm Ransomware is a Trojan that encrypts your files to block them until you pay for its decryption help. While malware researchers estimate that the Storm Ransomware's development isn't complete, the Trojan's payload can damage the saved information on your PC, along with showing other symptoms, such as pop-ups. Backing up your files to another device can keep them out of this threat's reach, and anti-malware products can disable and remove the Storm Ransomware.

Another Storm Front Casting Shade over Your Files

A new threat actor appears to be just starting to develop a threat capable of turning blocked content into a stream of undeserved income. This prospective campaign, going by the name of the Storm Ransomware, has not seen any wide distribution and shows several signs of incomplete production. However, malware analysts can confirm that it's just as able as any of its more sophisticated competition at damaging files with encryption, which keeps the resulting content from opening.

The Storm Ransomware uses the CBC mode AES encryption to encipher the files on the infected PC and may try to block formats including spreadsheets, text documents, pictures, and archives, among other content. A variety of hard-coded strings in the Storm Ransomware's source code also implies that the Trojan isn't generating a custom key for decryption purposes dynamically, which could make the Storm Ransomware especially vulnerable to reverse engineering attempts that can help develop a free decryptor. However, casual PC users may not be aware that methods other than paying the Storm Ransomware's ransom can decrypt and unlock their files.

The Trojan also uses a simple, HTA-based pop-up window for showing its ransom demands, which ask for Bitcoins in return for giving access to its decryption function. Other UI elements appear to be incomplete, including the wallet address that supposedly receives the ransom money, and, currently, victims have no way to pay. The author's relative inexperience in black hat campaigns also is evident in his choice of a Gmail-based e-mail address, similarly to the attacks of WinBan Ransomware.

Weather without the Threat of Ransom

Further investigation into the Storm Ransomware is likely to prove profitable for providing victims with recovery strategies from its data-locking attacks. Despite these promising leads, malware analysts never recommend avoiding backing up any files that need to remain safe in the long term. Simple data redundancy solutions, such as copying your files to a free USB drive and unplugging it, can eliminate any bargaining power that threats such as the Storm Ransomware might have after compromising your PC.

As often happens, the Storm Ransomware is showing a fully working encryption feature before many of its other components, including the ransoming and decryption methodology, be in their final forms. PC users always should assume that even 'unfinished' Trojans with encryption-related payloads are severe dangers to their file data potentially. Use anti-malware programs for blocking this threat's infection methods, such as e-mail attachments or torrents, as well as for removing the Storm Ransomware when it does install itself.

Lucky PC users may not be risking attacks from the Storm Ransomware necessarily, whose campaign isn't likely to be in direct competition against sophisticated RaaS software or families like Hidden Tear. However, betting on luck to save your files is a lifestyle choice with transparent disadvantages compared to doing what it takes to protect your computer.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Storm Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Related Posts

Home Malware Programs Ransomware Storm Ransomware

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.