Home Malware Programs Ransomware USBR Ransomware

USBR Ransomware

Posted: August 31, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 869
First Seen: August 31, 2017
Last Seen: June 14, 2023
OS(es) Affected: Windows

The USBR Ransomware is an updated version of Hidden Tear, a file-encrypting Trojan. This variant includes additional support for offline attacks after infecting a PC. All versions of Hidden Tear can be limited in capacity for harm by saving backups in a safe location, and dedicated anti-malware programs can uninstall the USBR Ransomware or delete it before its installation with little to no anticipated issues.

Cutting the Network out of the Loop of a Trojan Campaigning

Threat actors are coming up with new ways of exploiting the encryption features of the Turkish-made Hidden Tear program, whose educational, file-locking features are now a significant part of the Trojan industry's landscape. A recent derivative of Hidden Tear, the USBR Ransomware, is dispensing with what other Trojans often rely on as a necessary prerequisite for finishing their payloads: a connection to a remote server. This choice is similar to the attacks of the Azer Ransomware and some variants of the SamSam Ransomware family philosophically, even though the USBR Ransomware isn't a direct descendant.

As with most versions of Hidden Tear, the USBR Ransomware scans for files of predetermined formats (examples can include DOC, JPG, BMP, XLS, and ZIP) in all directories. Any media fitting the description goes through an AES enciphering routine that makes their data incomprehensible for their associated programs, such as Word or the Windows 10 Photos application. The USBR Ransomware also may add extensions or make other name-based edits to these files.

Malware researchers also found one substantial upgrade in the USBR Ransomware, when compared to similar, HT-based threats: it doesn't need to make contact with a Command & Control server for uploading or downloading a key. No information is available yet on whether the USBR Ransomware's name is an additional clue as to its intended distribution plans, such as via USB devices, or a red herring. However, the USBR Ransomware shows no worm-based features for creating duplicates of itself to compromise removable devices.

Evaporating a Trail of Hidden Tears

The ransom message that the USBR Ransomware drops for the victim to read contains few details other than a demand for 'some of your salary in Bitcoins.' The threat actor may be intending to add more details, such as an email or wallet address, later in this Trojan's development. Like most crypto currency payments, the USBR Ransomware's Bitcoin ransom is refundable only with permission from the recipient, and malware experts advise not paying to restore your files, if possible. Backing up your work to a safe, removable hard drive is ideal for curtailing encryption-based risks and eliminating the bargaining power of any USBR Ransomware infection.

Samples of the USBR Ransomware available to malware analysts provide no significant data on how its threat actor plans to distribute it to new PCs. Email spamming campaigns, website-hosted Exploit Kits, and brute-force compromised servers are archetypal examples of how a con artist might introduce this threat to your computer. Anti-malware programs and cautious Web-browsing behavior can help with eliminating the USBR Ransomware before it infects your PC, and the former also may assist with uninstalling the USBR Ransomware and stopping any ongoing attacks.

Most Web surfers are correct to think of the Internet as a place providing danger and informative resources in equal measure, but Trojans like the USBR Ransomware aren't dependent on it necessarily. Trojans with the ability to harm your computer even while it's offline are a recurrent security concern that every PC user should account for in their daily lives.

Loading...