Zoneware Ransomware
Posted: September 21, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 5/10 |
---|---|
Infected PCs: | 1,731 |
First Seen: | September 21, 2017 |
---|---|
Last Seen: | July 14, 2023 |
OS(es) Affected: | Windows |
The Zoneware Ransomware is a file-locking Trojan that holds media, such as videos or pictures, hostage by encrypting it. Con artists often follow these attacks by providing instructions asking you to pay Bitcoins or other currencies for their decryptor software, which this threat may display through both pop-ups and text messages. Affected users should have anti-malware products disinfecting their PCs and uninstalling the Zoneware Ransomware, to prevent any further damage, before using any free recovery data-recovering options, as appropriate.
Into the Extortion Zone
A new, file-locking Trojan's campaign is just beginning as of late September, with its threat actor using unknown system-infecting strategies to hold hostage documents and other content on the PC. For the time being, malware experts have yet to confirm whether the Zoneware Ransomware is an independent threat or a member of a previous family, such as Hidden Tear or the Jigsaw Ransomware. However, the chances are high that the Zoneware Ransomware is at least partially built using components of these old Trojans.
The Zoneware Ransomware (or the '.ZW Extension' Virus) is a Trojan that uses encryption to encode and lock different formats of files, potentially ranging from documents and spreadsheets to larger data types, such as video and archives. Besides adding '.ZW' extensions to the names of these files and blocking them from opening, the Zoneware Ransomware also may create other symptoms. Malware experts note that the most likely and high-visibility of these behaviors include:
- The Zoneware Ransomware may reset your desktop's wallpaper to a new image; typically, the new picture will be a generic encryption warning or an extension of the Trojan's ransoming demands (see below).
- This threat also may create both text documents and Web pop-ups, including HTA-formatted ones with interactive content, which deliver payment demands for unlocking your files. Live countdowns, crypto currency-based transaction options, warnings about the possible deletion of your files, and fake legal notifications all are traditional accompaniments of these attacks.
- In addition to keeping you from opening certain types of media, the Zoneware Ransomware also may block different applications, including the Task Manager, Regedit, or some brands of anti-virus software.
When Your Files are the Wares of a Trojan's Storefront
Although this Trojan's development may see further updates to its encryption method, any information that the Zoneware Ransomware locks may be suitable for decrypting by third-party applications. Any users who can't restore their content with backups should consider copying their enciphered media and ascertaining the compatibility of all public decryptors suitable for decoding this threat's payload. For users more interested in other restoration strategies, malware experts advise keeping backups on secure devices that the Zoneware Ransomware can't compromise.
Spam emails are the highest-trafficked vector for the distribution of all file-locking threats, this year. Besides disguising itself as part of an email attachment or link, the Zoneware Ransomware also may be installing through such exploits as corrupted website scripts, misnamed torrents, or abuses of RDP features. Any users who update their anti-malware programs when prompted should detect and delete the Zoneware Ransomware before it has an opportunity to damage any of their files. For halting ongoing encryption issues, all infected PCs should have sharp limitations in their contacts with other PCs, storage devices or the Internet until after you've removed the Zoneware Ransomware with appropriate security products.
Since malware experts have yet to verify which targets the Zoneware Ransomware is attacking, all users should consider themselves at risk for this campaign equally, until further notice. Turning files into captives for profit is a modern variant of a hostage-taking scenario that can afflict either global businesses or the everyday user while making money from both of them.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.