Home Malware Programs Ransomware Turkish Ransomware

Turkish Ransomware

Posted: March 16, 2017

Threat Metric

Threat Level: 2/10
Infected PCs: 255
First Seen: March 16, 2017
Last Seen: October 5, 2022
OS(es) Affected: Windows

The Turkish Ransomware is a Trojan that tries to force you to pay ransom money after it blocks your files. Adequate recovery methods not calling for paying con artists include using free decryption tools or reverting to a non-encrypted backup. You should use anti-malware programs to analyze new downloads and intercept this threat or, less ideally, remove the Turkish Ransomware after it installs itself.

Trojans Working Hard for Workers' Money

The threat campaigns targeting Turkey for cyber extortion are limited in number, but rising slowly. The Turkish Ransomware is the latest follow-up after Trojans like the fraudulent Cryptolocker 1.0.0 Ransomware and the DUMB-based Ramsomeer Ransomware, all of which employ file-encrypting attacks. After examining its installers, malware experts estimate that the Turkish Ransomware is in live distribution as forged internal communications to small business e-mail accounts within Turkey.

The 'March business' executable that the Turkish Ransomware uses for installation may conceal itself with an additional, fake extension or inappropriate icon. PCs compromised by this threat experience an encryption routine by the Trojan's TRY Catch File Encryptor module, which searches the local drives for different files, including Adobe PDF documents, Word documents, Excel spreadsheets, JPG images, and similar data potentially. The enciphered content becomes unreadable, although a victim can recognize them without trying to launch them purely by searching for the '.encrypted' extension (which also is in use in other Trojan attacks).

The Turkish Ransomware delivers its ransom demands for unlocking your content in both a pop-up or wallpaper image, as well as a Notepad file. Although most statistics of its attacks center in Turkey, the Turkish Ransomware's authors also include language support for English, Italian, French and German. As with most attacks of this type, the author demands a Bitcoin ransom, stopping you from canceling it if he doesn't uphold his end of the deal.

Keeping Yourself from Being Made into a Turkey by a Turkish Ransomware

While the Trojan's campaign is in its active deployment phase, not all anti-malware companies have finalized analyses of the Turkish Ransomware. Only a small number of current anti-malware organizations include positive detection rates for the Turkish Ransomware in their databases. Update your security software's database as soon as possible and, when appropriate, provide samples of the threat to interested researchers to facilitate the process of developing software solutions.

Malware researchers have yet to determine the viability of breaking the Turkish Ransomware's encryption routine. Some victims may be able to recover their files via free utilities, but saving backups is always a more sure means of protecting your content from similar attacks. Anti-malware products already proven against similar, file-encryption Trojans also should detect and remove the Turkish Ransomware either before or after it infects a PC.

Attacks like the Turkish Ransomware's campaign can come out of nowhere, rise to high numbers, and then switch to different strategies and brands in a matter of weeks or even days. However, they only profit from getting ransoms collected in the first place. No matter what files are at risk, rewarding the Turkish Ransomware with Bitcoins is an action with consequences you shouldn't underestimate.

Related Posts

Loading...