Home Malware Programs Ransomware 'tater@mail2tor.com' Ransomware

'tater@mail2tor.com' Ransomware

Posted: April 17, 2019

The 'tater@mail2tor.com' Ransomware is part of the GarrantyDecrypt Ransomware family of file-locking Trojans. It uses RSA encryption for stopping files like documents and other media from opening and may drop Notepad messages with its ransom demands for file-restoration help. Because this threat's family has secure cryptography, users should have backups for saving any digital content, besides using anti-malware programs for removing the 'tater@mail2tor.com' Ransomware in safety.

Potatoes in North America Spreading a File-Locking Blight

The family of file-locker Trojans that began in Europe and spread through variants like the '.metan File Extension' Ransomware is, now, showing up in Canada. The 'tater@mail2tor.com' Ransomware is the next member of the GarrantyDecrypt Ransomware, a small but thriving group of Trojans, as its campaigns (see also: the Cammora Ransomware, the COSANOSTRA Ransomware, and the 'secureserver-eu@protonmail.com' Ransomware) demonstrate. Unfortunately, there still are no indications of the 'tater@mail2tor.com' Ransomware's being any more decryptable than its ancestors.

The 'tater@mail2tor.com' Ransomware runs an encryption routine with an RSA algorithm basis for locking different files, which doesn't target OS components, but can damage such content as your pictures or documents. It adds 'tater' extensions to the filenames, as well, without changing the rest of the name. This encryption is secure from being unlocked by third parties – only the threat actor behind the 'tater@mail2tor.com' Ransomware's campaign has the key.

Most members of the 'tater@mail2tor.com' Ransomware's family drop multiple ransoming messages in a Notepad TXT format throughout the infected system, although malware analysts can't confirm the feature in this variant's payload. Since criminals can take the ransom payment and not concern themselves with decrypting the victim's files necessarily, users always should give themselves other ways of recovering digital media. Backing up work to other devices can keep it safe from encryption, deletion, and other attacks.

Canceling a Black Market Crop's Growth

The defenses against the 'tater@mail2tor.com' Ransomware's possible infection methods can include counter-strategies that are relevant for both the average computer owner and network admins or the employees of at-risk businesses like the medical sector. Some preemptive forms of protection that malware researchers recommend using against this class of threat include:

  • Always scan e-mail attachments before opening them, and remain aware of the vulnerabilities present in documents and document-embedded macros that threat actors could use for delivering Trojans.
  • Limiting online systems' file-writing privileges can isolate a file-locking Trojan and stop it from attacking the rest of a local network./li>
  • Proper password management can prevent a remote attacker's gaining access to your server or network by brute-forcing the login credentials. Avoid defaults and simple passwords like 'admin123.'

While the 'tater@mail2tor.com' Ransomware may disable a selection of competing threats like Arkei (a data stealer), this function isn't, obviously, a sign of infections being beneficial. Victims should remove the 'tater@mail2tor.com' Ransomware promptly with an appropriate anti-malware product before going on to traditional data recovery solutions.

Windows users never have enough to worry about, and the GarrantyDecrypt Ransomware remixes like the 'tater@mail2tor.com' Ransomware keep proving that. Your files are only as safe as you make them – and are worth what you're willing to pay for them, too.

Loading...