Home Malware Programs Ransomware Vo_ Ransomware

Vo_ Ransomware

Posted: December 7, 2016

Threat Metric

Threat Level: 8/10
Infected PCs: 342
First Seen: December 7, 2016
Last Seen: April 26, 2022
OS(es) Affected: Windows

The Vo_ Ransomware is a Trojan whose family encrypts your files to lock them while also adding a new prefix or extension to each name. Its attacks also solicit Bitcoin payments, which its authors claim will pay for a decryption program to reverse the data blockade. Although these recovery methods are potentially costly for no gain, malware researchers do encourage removing the Vo_ Ransomware through the usual anti-malware tools.

Paying for What's Already Yours Again

For the creators of threatening software, copying previous threats can be an easy way to launch brand-new campaigns with barely any delay in deployment, but some threat actors take the time to design more personalized Trojans. Although the landscape of file-encryption Trojans already has been inundated by different families of these threats, malware experts have another one to add to the growing list: the Vo_ Ransomware.

The Vo_ Ransomware is unusual for having variants that prefer prepending prefixes to the names of any content they encrypt, although some sources also report of it using a '.vo' extension. Malware researchers can verify the Vo_ Ransomware and variants of it using the following strings, inserted at the beginning of file names:

  • 'vo_'
  • 'sp_'
  • 'sq_'

These aesthetic changes are helpful for victims trying to identify the brand of file-encryption Trojan infecting their computers or servers. The Vo_ Ransomware blocks the files it modifies with a standard AES-RSA encryption function that encodes the contents of each file with a cipher whose key the Trojan protects with the RSA half of the algorithm. All content so affected is unusable without the decryption solution, which the Vo_ Ransomware's threat actors sell in exchange for Bitcoin payments.

Keeping the Call Sign of Threats Off Your Files

Malware researchers note evidence of older versions of the Vo_ Ransomware being active since the middle of 2015. While a victim may opt to pay the ransom the Vo_ Ransomware demands in its Notepad TXT-based instructions, doing so provides no protection from con artists taking the money without offering a decryption download. Protection from the Vo_ Ransomware's effects on your files can take the form of backups or advanced recovery software, although relying on local Shadow Copy data is inherently risky.

Geographical areas targeted by the Vo_ Ransomware's campaign include Korea and various English-speaking regions, with the infection exploits still under analysis. Threat actors often use e-mail tactics for installing Trojans of the Vo_ Ransomware's category, although direct attacks against weak passwords are a competitive second possibility. Changing passwords to ones not subject to being brute forced and scanning e-mail attachments with anti-malware software can remove network vulnerabilities and delete the Vo_ Ransomware, thereby avoiding the question of any ransom payment.

The Vo_ Ransomware embodies the continuing ingenuity of threat authors who have the programming know-how to create new threats without taking code from old ones. PC users should take heed of this recurring phenomenon in the threat industry and be just as attentive to updating their security solutions for blocking such threats on sight.

Related Posts

Loading...