Home Malware Programs Ransomware TiNx Ransomware

TiNx Ransomware

Posted: August 14, 2020

The TiNx Ransomware is a file-locking Trojan from the Xorist Ransomware family. The TiNx Ransomware stops users from opening documents, pictures, and other media by encrypting the files and holding them for ransom. Users should abide by robust security standards for preventing infections and let anti-malware tools remove The TiNx Ransomware as it becomes necessary.

Another Sip of Bitter TEA from the Wrong Cup

The file-locking Trojan family of the Xorist Ransomware has its name from the XOR and TEA algorithms in its file-locking attacks. Although the feature is a reasonably-distinguishing one, it doesn't strengthen a victim's hopes of getting their files back after infection. The TiNx Ransomware, a recent release from this group, reminds the public again that backups are as priceless as the files that they protect.

The TiNx Ransomware isn't the only campaign from its family for August – others include the YaKo Ransomware and the ZaCaPa Ransomware. Thanks to building off an easy-to-use 'kit,' the family stretches as far back as cases like the XRat Ransomware from 2016. The TiNx Ransomware may even be sharing threat actors with other campaigns; malware experts find strong similarities in ransom notes between their payloads, with the names from their extensions being the most significant differences.

The Trojan can lock files with its namesake encryption routine and targets the server's databases, documents, pictures, audio and other media formats in Windows. It then asks for a currently-standard ransom of 0.1 Bitcoins, equivalent to over one thousand USD, for unlocking the files with its decryptor. Victims of these attacks also have the option of using an online freeware unlocker, but should always have backups to maximize their chances of not losing any data.

Keeping All Your Bits to Yourself

Whether it's in bytes of data or Bitcoins, the value of TiNx Ransomware's campaign comes from targeting users who aren't sufficiently protecting their work in the first place. The TiNx Ransomware family has a history of targeting business entities and weak-security servers. Malware experts recommend that Windows users monitor such archetypal infection vectors as the brute-forcing of login credentials, e-mailed documents with work-themed disguises, and watering-hole attacks that use browser vulnerabilities on traffic-specific websites. The average user also should avoid such dangers as trafficking in illicit downloads, enabling JavaScript carelessly and not securing any RDP features.

Securing well-maintained backups on other devices with 'air gaps' or password protection will keep The TiNx Ransomware and different Xorist Ransomware variants from causing any significant, long-term harm to files. Doing also is highly-relevant to countering its competition in the same subsection of the threat landscape, such as Hidden Tear, the Jigsaw Ransomware, the Dharma Ransomware or the Scarab Ransomware. The TiNx Ransomware's payload is highly-noticeable after-the-fact (thanks to a combination of Windows pop-up alerts, wallpaper hijackings, and text notes). Unfortunately, at that point, the encryption of media is complete.

With just an extension separating it from its fellow Xorist Ransomware cousin, the ZaCaPa Ransomware, the TiNx Ransomware has no surprises in store for anyone. On the other hand, creativity can be unnecessary for criminals who know the value of long-standardized and polished techniques for making money off other people's carelessness.

Related Posts

Loading...