Home Malware Programs Ransomware Wallet Ransomware

Wallet Ransomware

Posted: March 3, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 64
First Seen: March 3, 2017
OS(es) Affected: Windows

The Wallet Ransomware is a new version of the Dharma Ransomware, a builder-generated Trojan that different threat actors can configure with the intent of locking various types of files for money. After encrypting your local data, the Wallet Ransomware creates messages asking for Bitcoin payments to give you the decryptor, which may or may not work as advertised. Using anti-malware products to protect your PC from the Wallet Ransomware is equally as important as possessing backups to give you recovery choices not entailing paying a ransom.

Opening Your Wallet for Some Digital Plundering

Although not been the family with the greatest number of variants necessarily, CrySiS builder-based threats like the Dharma Ransomware still are a mentionable force in the black market for file-encrypting threats. Malware analysts detected a new threat from this fork of the main project recently, either as an update from old threat actors or a new release from a new team of con artists. This new threat, the Wallet Ransomware, continues demonstrating the efficacy of collecting money by locking a PC's data selectively.

The Wallet Ransomware is a full-featured file encryptor Trojan that uses an AES cipher to 'block' any files fitting its list of formats to attack. Malware experts also verify it using file name modifiers such as '.wallet' extensions and inserted identifier numbers. When done, it also launches an additional image file that delivers its ransoming instructions: paying a Bitcoin fee to its author in exchange for the decryption code for your data.

The Wallet Ransomware version of the Crysis Ransomware uses encryption functions that third-party security researchers can't crack. However, there are no real protections to keep a con artist from accepting the ransom without giving you the decoding service in return.

Shrinking the Contents of a Cyber Crook's Wallet

Con artists who wield file-encrypting threats like the Wallet Ransomware may compromise business servers by targeting their e-mail accounts with forged e-mail messages or even break login passwords directly (a process known as a 'brute force' attack). Non-business entities and individuals are more likely to infect their PCs by visiting corrupted websites hosting drive-by-downloads and Exploit Kits like the Rig EK. Having your security software scan any unusual downloads, changing passwords and disabling vulnerabilities like JavaScript are some of the traditional defenses malware analysts can endorse.

However, none of the above protections can provide decrypting assistance for an already-infected computer. Threats like the Wallet Ransomware and its near relatives, such as the 'webmafia@asia.com' Ransomware and the 'wisperado@india.com' Ransomware, have the potential to lock your files permanently. Storing external backups can let you recover your files without decrypting them in rare instances where your anti-malware solutions don't remove the Wallet Ransomware immediately.

The high activity of this branch of the Crysis Ransomware is a strong clue that at least one group of threat actors remains committed to this category of threats as a profitable business model. The sooner any victims can deprive them of that profit, the sooner malware experts will cease seeing Trojans like the Wallet Ransomware.

Related Posts

Loading...