Home Malware Programs Ransomware 'traher@dr.com' Ransomware

'traher@dr.com' Ransomware

Posted: January 22, 2019

The 'traher@dr.com' Ransomware is a new version of the Scarab Ransomware, a family of file-locking Trojans. These threats can wipe your local backups, as well as encrypt any media, and may arrive through vulnerabilities targeting unsecured network configurations. Strong network security practices can prevent infections, and most anti-malware products should remove the 'traher@dr.com' Ransomware safely from your computer.

A Fake Doctor's Appointment (with Your Media)

The Scarab Ransomware family is growing, still, with variants available for targeting victims from Russia or any other nation around the world virtually. The newest version that malware analysts designate as a definitive familial member is the 'traher@dr.com' Ransomware, which belongs to the English-based half, like the Scarab-Crypted034 Ransomware, the Scarab-DD Ransomware, the Scarab-Good Ransomware or the Scarab-Recovery Ransomware. No additional vulnerabilities are confirmable for helping the users get their files unlocked, which places the onus of any data restoration on one's backups, should they exist.

The 'traher@dr.com' Ransomware is a Windows program, like the other versions of the Scarab Ransomware's family, which owes its proliferation to a financially successful Ransomware-as-a-Service or RaaS practice. The criminal that's distributing this variant doesn't appear to have made changes beyond the e-mail address, which the 'traher@dr.com' Ransomware adds into the filenames of all the media that it encrypts. Its encryption routine may or may not be secure against decryption that would once again 'unlock' the file, but there is no free decryption service available.

The overall conclusions by malware experts place the files at risk from the 'traher@dr.com' Ransomware infections as being documents, images, and other, general-purpose formats, ones that the user saves on 'default' Windows account locations or the desktop particularly. Importantly, the users should note that having a Restore Point is no protection from the 'traher@dr.com' Ransomware, which can delete the Shadow Volume Copies for that backup. Network-accessible PCs, whether mapped or not, are vulnerable to the encryption side of the 'traher@dr.com' Ransomware's payload equally.

Prying a Scarab Out of Your Docs

There are several effective protections against the Scarab Ransomware's numerous members, like the 'traher@dr.com' Ransomware, and other threats with similar, encryption-derived payloads. These defenses include using strong login combinations for your networks, closing any ports that you don't need, avoiding download resources with histories of toxicity (such as torrent networks), and backing up your work to other devices. The 'traher@dr.com' Ransomware is designed for targeting business networks for maximized profitability but is no less threatening to the average, home computer.

Windows PCs should have backups besides the Restore Points for overall safety, and the victims may contact interested cyber-security specialists for additional analysis on the decryption chances with the 'traher@dr.com' Ransomware. However, paying the ransom, which the 'traher@dr.com' Ransomware requests in its ransoming instructions, isn't a guarantee of getting a file unlocker. Anti-malware products of most brands should uninstall the 'traher@dr.com' Ransomware along with blocking most installation exploits.

Besides insisting on Bitcoin-based payments, the 'traher@dr.com' Ransomware doesn't give much help on estimating the cost of recovering your files. For anyone who owns a proper backup and good security software, however, that price should be a palatable zero.

Loading...