Home Malware Programs Ransomware Zbw Ransomware

Zbw Ransomware

Posted: July 27, 2020

The Zbw Ransomware is a file-locking Trojan from the Makop Ransomware family. The Zbw Ransomware can block digital media on your computer, such as documents, as well as destroy backups, change files' names, and leave extortionist text messages. Users with secured backups should recover quickly, and most anti-malware solutions will remove the Zbw Ransomware appropriately.

The Makop Ransomware Has a Resurgence

The Trojan family of the Makop Ransomware makes its early history in Turkey, but new versions are, increasingly, attacking users with English as the language of preference. This choice is the same with many modern variants of the small family that malware experts catch, such as the Origami Ransomware, the Shootlock Ransomware, and July's Zbw Ransomware. Like most established Ransomware-as-a-Service operations, attacks by this threat depend on a streamlined business model and victims who aren't protecting their file data proactively.

The Windows-based Zbw Ransomware uses AES encryption, like many RaaSes, for locking media files after gaining access to a PC. Attacks by this threat show minimal symptoms until after blocking the data from opening. This sabotage includes the by-now-cliche process of adding e-mails and other ransoming information to their names. The Zbw Ransomware's extension and new e-mail address make up the few details separable from older iterations of the Makop Ransomware family.

Although malware researchers have yet to confirm the Zbw Ransomware behavior, its family historically tends towards wiping the Restore Point information. Such a feature, commonplace amongst file-locker Trojans, lets the threat actor hold the data hostage while waiting for a Bitcoin ransom. Backups on other, protected devices always are the most-efficient solution to these extortion-based campaigns.

Tracking Down International File Criminals

The family that the Zbw Ransomware hails from is a global problem, as many of the Trojan-for-hire businesses on the dark Web. However, malware experts can point to some minor clues that could prove helpful for future victims. The Trojan specifies an African nation in its e-mail address. It also uses a Russian domain, highlighting both these countries' possible thematic involvement in any fake download schemes, such as software cracks, Coronavirus trackers or media player updates. All users should maintain generally-strict precautions for any possibly-unsafe downloads and be careful with enabling features like JavaScript, Flash, and macros.

RaaS campaigns may use different infection methods on an attack-by-attack basis, often, semi-unpredictably. Although users can endanger themselves with unwise downloading behavior, even professional organizations are at risk. Malware experts tend to track file-locker Trojan infections back to e-mail attachments, server software vulnerabilities, and insecure passwords.

The ideal protection against the Zbw Ransomware calls for backups kept offsite and well-maintained. Updated and efficient anti-malware services can delete the Zbw Ransomware after detecting it as a threat, which should occur automatically.

The Zbw Ransomware is a new Trojan, but one might mistake it for a much older one. Illicit software evolves as necessity dictates, and for this family, it seems that victims aren't taking any precautions worth considering with any extra programming time.

Loading...