Home Malware Programs Ransomware Zeoticus Ransomware

Zeoticus Ransomware

Posted: January 3, 2020

The Zeoticus Ransomware is a file-locker Trojan without a noted family or attached Ransomware-as-a-Service business. Although the Zeoticus Ransomware includes unique references to Japanese TV media, its attacks target English-speaking victims and can stop most files from opening by encrypting them. You should always have a backup of your work saved for recovering securely and use anti-malware tools when appropriate for deleting the Zeoticus Ransomware.

A Cartoon Character Assails Your Files

The somewhat mocking use of popular media franchises as themes for the more frivolous file-locker Trojans' campaigns makes for a long-running habit that continues into the start of 2020. The Zeoticus Ransomware, following in the footsteps of xHunt, the Megumin Trojan, and the DeathNote Ransomware, is turning Japanese cartoon media into a symbol of cyber-crime. Otherwise, however, the Zeoticus Ransomware is a prosaic and paint-by-numbers Trojan of its class.

The 32-bit Windows app uses AES-based encryption – one of the most commonplace algorithms for 'locking' files securely – for keeping users from accessing their documents, pictures and similar media. The first clue of the theme comes from the extension it adds to these files, 'zoeticus,' which is an apparent reference to a character in Japan's 'High School DxD' cartoon and comic franchise. Further details less visible to victims include Command & Control user-agent information that further references the franchise.

However, the Zeoticus Ransomware doesn't target Japanese fans with its attacks. Ransom notes that it creates through hijacking the desktop background and generating an HTML file are in English, and deliver generic warnings and e-mail addresses for contacting the threat actor. Usually, criminals will insist on Bitcoin or voucher-based payments for providing their possible decryption help and restoring your work. However, malware experts recommend avoiding any gambling on these transactions if it's at all possible.

Guaranteeing Your Digital Work Stays Free of Unwanted Animation Gags

The playfulness that the Zeoticus Ransomware evinces is very familiar to researchers of independent file-locker Trojans, but its encryption is no less a technical barrier to accessing media than the more-solemn attacks of a RaaS family's Trojan. Because malware researchers have yet to confirm whether or not the Zeoticus Ransomware's payload is decryptable through a third-party, victims should prioritize providing samples to appropriate cyber-security institutions. They also should outline any suspected infection routes for keeping the Zeoticus Ransomware from propagating further.

A secure and non-local backup is preferable for sparing files from any ransom-related recovery needs and is far more reliable than depending on decryption. In the meantime, users can always protect their media through typical security standards. The most relevant ones include using sufficiently-strong passwords, deactivating scripts on questionable websites, updating their software (especially website infrastructure apps and document readers) and avoiding illicit downloads.

Although many anti-malware brands are deleting the Zeoticus Ransomware through heuristic detection methods, a majority of vendors aren't flagging current samples. Always update your security programs' databases, when possible, for the best chance of blocking a Trojan installation attempt on sight.

The Zeoticus Ransomware is a slightly playful case of a file-locker Trojan, but one whose bottom line is dead-serious. The occasional cartoon gag here or there doesn't make it any more amicable to users who can't open their documents because of its attacks.

Loading...