Home Malware Programs Ransomware Wisperado@india.com Ransomware

Wisperado@india.com Ransomware

Posted: February 24, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 11
First Seen: February 24, 2017
OS(es) Affected: Windows


The 'wisperado@india.com' Ransomware is a variant of the Dharma Ransomware, a file-encrypting Trojan that leaves ransoming messages on the victim's PC after locking any files. Since the 'wisperado@india.com' Ransomware's encryption attacks aren't reversible without access to decrypting the data held by its threat actor, you should prevent a hostage situation by keeping backups dated from before the infection. Standard anti-malware products also may detect and delete the 'wisperado@india.com' Ransomware at any of several infection vectors, such as spam e-mails.

Just a New Wisp of Trouble for Your Files

The Dharma Ransomware branch of the CrySiS-based Trojan family is maintaining its heavy-proliferation reputation with new releases. Malware experts have not yet confirmed whether some of these latest threats, such as the 'wisperado@india.com' Ransomware, are from brand-new threat actors or merely previously-active ones changing communication infrastructures. The risk to the victim's files remains consistent, with an encryption-based payload that requires help from the Trojan's author to revert.

The 'wisperado@india.com' Ransomware blocks media including documents, pictures, and spreadsheets by encrypting each file individually via an AES or Rijndael algorithm. The 'wisperado@india.com' Ransomware can compromise network-accessible drives, in addition to local ones, although the operating system and other, installed programs should be unaffected. The 'wisperado@india.com' Ransomware appends the unique '.viper1' and '.viper2' extensions to their names, in addition to inserting its e-mail address for the ensuing ransom negotiations.

After the media encoding, the 'wisperado@india.com' Ransomware issues a hidden command for erasing any Shadow Copy backups (which could restore the encrypted files) and drops messages demanding ransom payments. Malware experts always see this family of Trojans using multiple formats for the latter, including JPG images, local Web pages and Notepad text. In nearly all cases, threat actors leveraging the 'wisperado@india.com' Ransomware and other file-enciphering Trojans will ask for the ransom through a method that doesn't provide refunds, such as a cryptocurrency.

The Digital Antitoxin for a Trojan's Snakebite

Since CrySiS kit-made Trojans are the creations of different sets of threat actors, their distribution methods and intended targets will differ between each campaign. Malware experts estimate that the 'wisperado@india.com' Ransomware is likely to attack business networks and servers with vulnerable RDP settings or poor e-mail security protocols currently, both of which offer potential infection vectors. Installers for the 'wisperado@india.com' Ransomware may disguise themselves to look like safe documents from an internal department or a shipping company.

The anti-malware industry has yet to develop a decryptor applicable to most versions of the CrySiS Trojans, which includes the Dharma Ransomware and its February variant of the 'wisperado@india.com' Ransomware. At the same time, making a ransom payment may or may not give you access to a decryptor, depending on the individual generosity of the con artist in question. Use backups and store them in locations not able to be erased or encrypted to keep the 'wisperado@india.com' Ransomware from causing permanent harm to your files.

Typically, relying on seeing the symptoms of a Trojan's file encryption results in the loss of money, file data or both. Take appropriate data redundancy-oriented precautions and use your anti-malware protection to catch the 'wisperado@india.com' Ransomware before it can cause issues not easily remedied.

Loading...