Home Malware Programs Ransomware Tron Ransomware

Tron Ransomware

Posted: April 16, 2018

The Tron Ransomware is a Trojan that locks your files by using encryption for converting their data into unusable, enciphered content. Although the attack may be reversible, malware researchers encourage keeping backups that can reduce any need for a decryption solution. Most anti-malware products should remove the Tron Ransomware immediately and before any harm comes to your digital media.

American Sci-Fi Wants Bitcoins for Your Files

Although it's one of the more well-known names in science fiction cinema, 'Tron' also refers to something else, now: another Trojan that's seeking to capture computer files for money. The Tron Ransomware's source code is available on the Russian Dark Web, which makes it subject to abuse by any threat actors with the desire to launch a campaign for extorting money for a file decryptor readily. Malware researchers are verifying one victim, for now, which indicates that the Tron Ransomware is more than just an educational pet project.

Like the majority, but not all, file-locking threats, the Tron Ransomware uses the AES encryption for enciphering the victim's data. The Tron Ransomware does so within a range of different locations that include the Windows desktop, the Downloads folder, the Favorites folder and the My Music/Pictures/Video folders. Although this encryption renders your files into non-opening formats, malware experts find the most curious aspect of the attack is its use of a static key.

Different variants of the Tron Ransomware use different keys. One version uses, for example, the 'thankyouforbuyingkey' code for its decryptor. The users should contact a cyber-security researcher for retrieving this key instead of following any ransoming demands that the Tron Ransomware presents.

Another, equally important function in the Tron Ransomware is how it sorts its victims. The Trojan includes a default feature for auto-exiting whenever it would attack a system using a Russian-based IP address. This parameter is becoming more frequent with file-locking threats like the Tron Ransomware, with similar competitors including the MOLE66 Ransomware variant of the CryptMix Ransomware and the 'Ransomware-as-a-Service' Rapid 2.0 Ransomware.

Canceling a Premiere that No One Wants to See

Since the Tron Ransomware is in the wild and attacking PC users via unknown methods currently, all users with valuable digital media saved to the above directories should take the traditional precautions against this threat's payload. Defenses can include backing their files up to portable storage, using a protected cloud service, maintaining strict login security for all networks, and avoiding opening any suspicious files without scanning them, first. E-mail is a particularly anticipated infection vector for most, but not all Trojans within the Tron Ransomware's classification.

Some of the Tron Ransomware's code implies that its campaign is targeting Kazakhstan's residents, but nothing about its data-locking feature is limited to working in that region. The threat generates a post-attack pop-up that sells its decryption services for unlocking your files in return for 0.05 Bitcoins (roughly four hundred USD), although victims always should attempt any free data-recovering solutions, first. Malware experts find one out of every two AV products detecting and deleting the Tron Ransomware during a standard system scan, which is the recommended disinfection strategy for most users.

The Tron Ransomware is most relevant to users who save their files to default storage folders happily without stopping to consider the consequences of doing so or failing at taking other security precautions. Using custom folders is one of the many ways of keeping your data less at risk from a campaign like the Tron Ransomware's, which profits from the predictable habits of the average PC owner.

Related Posts

Loading...